• LPB5028A has (20) 10/100/1000BASE-T access ports, (4) 100/1G copper/
fiber combo ports with dual-speed SFP slots, and (4) 10 Gigabit SFP+
uplink ports with dual-speed (1G/10G).
• LPB5052A has (48) 10/100/1000BASE-T access ports, and (4) 10 Gigabit
SFP+ uplink ports with dual-speed (1G/10G).
LPB5028A
LPB5052A
Customer
Support
Information
Order toll-free in the U.S.: Call 877-877-BBOX (outside U.S. call 724-746-5500)
FREE technical support 24 hours a day, 7 days a week: Call 724-746-5500 or fax 724-746-0746
Mailing address: Black Box Corporation, 1000 Park Drive, Lawrence, PA 15055-1018
Web site: www.blackbox.com • E-mail: info@blackbox.com
Page 2
Trademarks Used in this Manual
Trademarks Used in this Manual
Black Box and the Double Diamond logo are registered trademarks of BB Technologies, Inc.
Any other trademarks mentioned in this manual are acknowledged to be the property of the trademark owners.
Disclaimer:
Black Box Network Services shall not be liable for damages of any kind, including, but not limited to, punitive, consequential or
cost of cover damages, resulting from any errors in the product information or specifications set forth in this document and Black
Box Network Services may revise this document at any time without notice.
We‘re here to help! If you have any questions about your application
or our products, contact Black Box Tech Support at 724 -746-5500
or go to blackbox.com and click on “Talk to Black Box.”
You’ll be live with one of our technical experts in less than 60 seconds.
Page 2
724-746-5500 | blackbox.com
Page 3
FCC and IC RFI Statements
Federal Communications Commission and Industry Canada Radio Frequency Interference
Statements
This equipment generates, uses, and can radiate radio-frequency energy, and if not installed and used properly, that is, in strict
accordance with the manufacturer’s instructions, may cause inter ference to radio communication. It has been tested and found to
comply with the limits for a Class A computing device in accordance with the specifications in Subpart B of Part 15 of FCC rules,
which are designed to provide reasonable protection against such interference when the equipment is operated in a commercial
environment. Operation of this equipment in a residential area is likely to cause interference, in which case the user at his own
expense will be required to take whatever measures may be necessary to correct the interference.
Changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to
operate the equipment.
This digital apparatus does not exceed the Class A limits for radio noise emis sion from digital apparatus set out in the Radio
Interference Regulation of Industry Canada.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de
la classe A prescrites dans le Règlement sur le brouillage radioélectrique publié par Industrie Canada.
724-746-5500 | blackbox.com
Page 3
Page 4
NOM Statement
Instrucciones de Seguridad
(Normas Oficiales Mexicanas Electrical Safety Statement)
1. Todas las instrucciones de seguridad y operación deberán ser leídas antes de que el aparato eléctrico sea operado.
2. Las instrucciones de seguridad y operación deberán ser guardadas para referencia futura.
3. Todas las advertencias en el aparato eléctrico y en sus instrucciones de operación deben ser respetadas.
4. Todas las instrucciones de operación y uso deben ser seguidas.
5. El aparato eléctrico no deberá ser usado cerca del agua—por ejemplo, cerca de la tina de baño, lavabo, sótano mojado o cerca
de una alberca, etc.
6. El aparato eléctrico debe ser usado únicamente con carritos o pedestales que sean recomendados por el fabricante.
7. El aparato eléctrico debe ser montado a la pared o al techo sólo como sea recomendado por el fabricante.
8. Servicio—El usuario no debe intentar dar servicio al equipo eléctrico más allá a lo descrito en las instrucciones de operación.
Todo otro servicio deberá ser referido a personal de servicio calificado.
9. El aparato eléctrico debe ser situado de tal manera que su posición no interfiera su uso. La colocación del aparato eléctrico
sobre una cama, sofá, alfombra o superficie similar puede bloquea la ventilación, no se debe colocar en libreros o gabinetes
que impidan el flujo de aire por los orificios de ventilación.
10. El equipo eléctrico deber ser situado fuera del alcance de fuentes de calor como radiadores, registros de calor, estufas u otros
aparatos (incluyendo amplificadores) que producen calor.
11. El aparato eléctrico deberá ser connectado a una fuente de poder sólo del tipo descrito en el instructivo de operación, o como
se indique en el aparato.
12. Precaución debe ser tomada de tal manera que la tierra fisica y la polarización del equipo no sea eliminada.
13. Los cables de la fuente de poder deben ser guiados de tal manera que no sean pisados ni pellizcados por objetos colocados
sobre o contra ellos, poniendo particular atención a los contactos y receptáculos donde salen del aparato.
14. El equipo eléctrico debe ser limpiado únicamente de acuerdo a las recomendaciones del fabricante.
15. En caso de existir, una antena externa deberá ser localizada lejos de las lineas de energia.
16. El cable de corriente deberá ser desconectado del cuando el equipo no sea usado por un largo periodo de tiempo.
17. Cuidado debe ser tomado de tal manera que objectos liquidos no sean derramados sobre la cubierta u orificios de ventilación.
18. Servicio por personal calificado deberá ser provisto cuando:
A: El cable de poder o el contacto ha sido dañado; u
B: Objectos han caído o líquido ha sido derramado dentro del aparato; o
C: El aparato ha sido expuesto a la lluvia; o
D: El aparato parece no operar normalmente o muestra un cambio en su desempeño; o
E: El aparato ha sido tirado o su cubierta ha sido dañada.
This guide gives specific information on how to operate and use the management functions of the Gigabit PoE+ Ethernet
Managed Switch Eco.
The guide is intended for use by network administrators who are responsible for operating and maintaining network equipment;
consequently, it assumes a basic working knowledge of general switch functions, the Internet Protocol (IP), and Simple Network
Management Protocol (SNMP).
The following conventions are used throughout this guide to show information:
NOTE: Emphasizes important information or calls your attention to related features or instructions.
CAUTION: Alerts you to a potential hazard that could cause loss of data, or damage the system or equipment.
WARNING: Alerts you to a potential hazard that could cause personal injury.
Safety Information
CAUTION: Circuit devices are sensitive to static electricity, which can damage their delicate electronics. Dry weather conditions or
walking across a carpeted floor may cause you to acquire a static electrical charge.
To protect your device, always:
• Touch the metal chassis of your computer to ground the static electrical charge before you pick up the circuit device.
• Pick up the device by holding it on the left and right edges only.
• If you need to connect this switch to an outdoor device, add an arrester on the cable between the outdoor device and this
switch.
NOTE: The switch is indoor device, if it connects with an outdoor device, then it must use a lightning arrester to protect the
switch.
WARNING:
• Do not place the switch outdoors.
• Before installation, make sure the input power supply and product specifications are compatible with each other.
• To reduce the risk of electric shock, disconnect all AC or DC power cords and RPS cables to completely remove power from the
unit.
• Before importing/exporting configuration, make sure the firmware version is the same.
• After a firmware upgrade, the switch will update automatically to the latest firmware version.
How to Download the User Manual
The Gigabit PoE+ Ethernet Managed Switch Eco user manual gives specific information on how to operate and use the management functions of the switch:
To download the Gigabit PoE+ Ethernet Managed Switch Eco user manual from the Web site:
1. Go to www.blackbox.com
2. Enter the part number (LPB5028A or LPB5052A) in the search box:
3. Click on the “Resources” tab on the product page, and select the document you wish to download.
2.1 Over vi e w ......................................................................................................................................................................12
2.2 About this Manual ........................................................................................................................................................12
2.3 Features .......................................................................................................................................................................12
2.4.3 Port and System LEDs .....................................................................................................................................14
2.4.4 Power Supply Socket ......................................................................................................................................14
2.4.5 Mode Status LEDs ...........................................................................................................................................15
3.2 Connecting to PCs, Servers, Hubs, and Switches ..........................................................................................................19
4. System .......................................................................................................................................................................21
4.1 System Information .......................................................................................................................................................21
4.1.1 Information .....................................................................................................................................................21
4.1.3 CPU Load ....................................................................................................................................................... 23
4.2 Time .......................................................................................................................................................................24
4.4 IP ...................................................................................................................................................................... 29
4 . 6 .1 S y s te m ........................................................................................................................................................... 34
4.6.5 Groups ........................................................................................................................................................... 37
4.6.8 Tarp ............................................................................................................................................................... 40
5.1 Port ...................................................................................................................................................................... 43
5.1.2 Port Description ............................................................................................................................................. 45
5.1.6 SFP Information ............................................................................................................................................. 49
5.2.1 Por t s ............................................................................................................................................................... 51
5.2.3 Access Control List ......................................................................................................................................... 53
5.2.4 ACL Status ..................................................................................................................................................... 60
5.4 Spanning Tree .............................................................................................................................................................. 68
5.4.6 Bridge Status ................................................................................................................................................. 77
5.4.7 Port Status ..................................................................................................................................................... 77
5.4.8 Port Statistics ................................................................................................................................................. 78
5.5.3 Port Group Filtering ....................................................................................................................................... 82
5.5.5 Group Information ......................................................................................................................................... 84
5.5.6 IPv4 SSM Information .................................................................................................................................... 85
5.6.3 Port Group Filtering ....................................................................................................................................... 90
5.6.5 Group Information ..........................................................................................................................................93
5.6.6 IPv6 Ssm Information ......................................................................................................................................93
5.7.2 MVR Port Group Allow Configuration ........................................................................................................... 96
5.7.3 Groups Information ....................................................................................................................................... 96
5.8.5 Port Statistics ................................................................................................................................................ 111
5.9.3 Power Delay..................................................................................................................................................116
5.9.4 Auto Checking .............................................................................................................................................. 117
5.10.2 Dynamic MAC Table .....................................................................................................................................122
5.11.1 VL AN Member s h i p ....................................................................................................................................... 123
724-746-5500 | blackbox.com
Page 7
Page 8
Table of Contents
5 .11. 2 Por t s .............................................................................................................................................................125
5.11.3 Switch Status ................................................................................................................................................126
5.11.4 Port Status ....................................................................................................................................................128
5.12.2 OU I ............................................................................................................................................................... 138
5.15.1 Port Classification ........................................................................................................................................ 146
5.15.2 Port Policing..................................................................................................................................................147
5.15.3 Port Scheduler ............................................................................................................................................. 148
5.15.4 Port Shaping ................................................................................................................................................. 151
5.15.5 Port Tag Remarking ......................................................................................................................................154
5.15.6 Port DSCP .....................................................................................................................................................155
5.15.10 QoS Control List Configuration .....................................................................................................................162
5.15.11 QCL St atus ....................................................................................................................................................165
5.15.12 Storm Control ...............................................................................................................................................167
5.15.13 W R ED .......................................................................................................................................................... 168
5 .16.1 Collec to r .......................................................................................................................................................169
5.17. 2 Statu s ............................................................................................................................................................ 174
5.18 Single IP .....................................................................................................................................................................175
5.18.2 Information ................................................................................................................................................... 176
5.19 Easy Port .....................................................................................................................................................................176
6.5 NAS .....................................................................................................................................................................195
6.5.2 Switch Status ............................................................................................................................................... 202
6.5.3 Port Status ................................................................................................................................................... 204
6.7 Port Security ...............................................................................................................................................................210
6.7.1 Limit Control .................................................................................................................................................210
6.7.2 Switch Status ................................................................................................................................................213
6.7.3 Port Status ....................................................................................................................................................215
7.3 S a v e/ Res t o re ...............................................................................................................................................................224
7.3.2 Save Start .....................................................................................................................................................224
7.3.3 Save User ..................................................................................................................................................... 225
7.3.4 Restore User ................................................................................................................................................ 225
Appendix A. Glossary of Web-based Management .....................................................................................................................231
The Gigabit PoE+ Ethernet Managed Switch Eco provides a reliable infrastructure for your business network. The switch improves
the availability of your critical business applications, protects your sensitive information, and optimizes your network bandwidth.
Easy to set up and use, it provides the ideal combination of affordability and capabilities for entry-level networking. Use the switch
in a small business or enterprise application.
Two models are available:
• Gigabit PoE+ Ethernet Managed Switch Eco – 24-Port (product code LPB5028A). This model has (20) 10/100/1000BASE0-T
access ports, (4) copper/fiber combo ports with dual-speed SFP slots, and (4) 10 Gigabit SFP+ uplink ports with dual speed
(1G/10G).
• Gigabit PoE+ Ethernet Managed Switch Eco – 52-Port (product code LPB5052A). This model has (48) 10/100/1000BASE-T
access ports and (4) 10 Gigabit SFP+ uplink slots with dual speed (1G/10G).
Unlike other entry-level network switching solutions that provide advance managed network capabilities only in the costliest
models, the Gigabit PoE+ Ethernet Managed Switch Eco supports data, voice, security, and wireless technologies. The switch is
easy to deploy and configure.
2.2 About this Manual
This user’s manual tells you how to install and connect your network system and configure and monitor the LPB5028A or
LPB5052A by (RS-232) serial interface or through the Web and Ethernet ports. Detailed explanations of hardware and software
functions are shown as well as operation examples for a Web-based interface.
2.3 Features
• L2+ features provide better manageability, security, QoS, and performance.
• High port count design includes all Gigabit Ethernet ports.
• Supports the following:
• Guest VLAN, voice VLAN, Port based, tag-based, and Protocol based VLANs.
• 802.3az Energy Efficient Ethernet standard.
• 8K MAC table.
• IPv6/ IPv4 Dual stack.
• s-Flow.
• 802.3at and complies with 802.3af standard.
• Easy-Configuration-Port for IP Phone, IP camera, or wireless environment.
Page 12
724-746-5500 | blackbox.com
Page 13
2.4 Hardware Description
Figures 2-1 and 2-2 show the front and back panels of the LPB5052A.
Chapter 2: Introduction
Link/Act LED
Speed LED
PoE LED
System LED
Mode button
Console port
10/100 /10 00BA SE-T
RJ- 45 ports
Switch TP
Port LEDs
Figure 1-1. Front of the LPB5052A Switch.
1G/10G SF P
ports
Switch SFP
Port LEDs
AC power
socket
Figure 1-2. Back of the LPB5028A or LPB5052A Switch.
2.4.1 1000BASE-T Ports
The LPB5028A switch has (20) 1000BASE-T RJ-45 ports and (4) copper/fiber combo ports with dual-speed SFP slots, and the
LPB5052A switch has (48) 1000BASE-T RJ-45 ports. All RJ-45 ports support automatic MDI/MDI-X operation, auto-negotiation
and IEEE 802.3x auto-negotiation of flow control, so the optimum data rate and transmission can be selected automatically.
2.4.2 SFP Transceiver Slots
The Gigabit PoE+ Ethernet Managed Switch Eco LPB5028A supports the Small Form Factor Pluggable (SFP) transceiver slots on
ports 21 to 28, and the LPB5052A supports SFP on ports 48 to 52.
Table 2-1 shows a list of transceiver types that have been tested with the switch. For information on the recommended standards
for fiber optic cabling, see “1000 Mbps Gigabit Ethernet Collision Domain” on page X.
724-746-5500 | blackbox.com
Page 13
Page 14
Chapter 2: Introduction
Table 2-1. Supported SFP Transceivers.
Product CodeDescription
LFP401SFP, 155-Mbps Fiber with Extended Diagnostics, 850-nm Multimode, LC, 2 km
LFP402SFP, 155-Mbps Fiber with Extended Diagnostics, 1310-nm Multimode, 2 km, LC
LFP403SFP, 155-Mbps Fiber with Extended Diagnostics, 1310-nm Single-Mode, Plus, 30 km, LC
LF P 411SFP, 1.25-Gbps Fiber with Extended Diagnostics, 850-nm Multimode, LC, 300 m
LFP412SFP, 1.25-Gbps Fiber with Extended Diagnostics, 1310-nm Multimode, LC, 2 km
LFP413SFP, 1.25-Gbps Fiber with Extended Diagnostics, 1310-nm Single-Mode, LC, 10 km
LFP414SFP, 1.25-Gbps Fiber with Extended Diagnostics, 1310-nm Single-Mode, LC, 30 km
LSP42110GBASE-SR SFP+, 850-nm Multimode, 300 m, LC
LSP42210GBASE-SR SFP+, 1310-nm Single-Mode, 10 km, LC
2.4.3 Port and System LEDs
The Gigabit PoE+ Ethernet Managed Switch Eco switch includes a display panel for system and port indications that simplify
installation and network troubleshooting. The LEDs are located on left-hand side of the front panel for easy viewing. Details are
shown below and described in the following tables.
Table 2-2. Port Status LEDs.
LEDConditionStatus
TP (Link/ACT) Green/BlinkingLights Green when TP link is good.
Blinks when any traffic is present.
TP SPEEDGreen/ YellowLights Green when TP link on 1000 Mbps.
Yellow when TP link on 10/100 Mbps.
PoE (Link/ACT) GreenLights Green when PoE links with PD and supplies power to PD.
SFP (Link/ACT) Green/BlinkingLights Green when SFP link good.
Blinks when any traffic is present.
SFP SPEEDBlue/GreenLights Blue when SFP link on 10Gbps.
Green when SFP link on 1000Mbps
Table 2-3. System Status LED.
LEDConditionStatus
System LEDGreen, OFFLights when power is on and the switch is ready.
2.4.4 Power Supply Socket
The power socket uses an AC power cord and is located on the rear panel of the switch. See Figure 1-2.
Page 14
724-746-5500 | blackbox.com
Page 15
Chapter 2: Introduction
2.4.5 Mode Status LEDs
The Gigabit PoE+ Ethernet Managed Switch Eco has a mode switch. Each LED can switch between Link/ACT mode and Speed
mode when you press the Mode button. When the switch is on Link/ACT mode, each port's LED indicates the link or activity status. When switch is in Speed mode, each port’s LED shows the link speed status of the port using different colors.
Table 2-4. Mode Status LED.
LEDConditionStatus
Link/ACT GreenLights when the corresponding port is in Link/ACT mode.
SpeedGreenLights when the corresponding port is in Speed mode.
PoE (Link/ACT) GreenLights when the corresponding port is in PoE (Link/ACT) mode.
2.5 Switch Architecture
The switch operates at wire-speed, transporting multiple packets at low latency on all ports simultaneously.The switch also
operates at full-duplex, which effectively doubles the bandwidth of each connection.
For maximum data integrity, the switch uses store-and-forward technology. With this technology, the entire packet is received into
a buffer and checked for validity before it is forwarded. This prevents errors from being propagated throughout the network.
2.6 Network Management Options
You can also manage the switch over the network via a Web browser or Telnet. The switch includes a built-in network
management agent that allows it to be managed in-band using SNMP or RMON (Groups 1, 2, 3, 9) protocols. It also has an
RS-232 DB9 console port connector on the front panel for out-of-band management. A PC may be connected to this port for
configuration and monitoring out-of-band via a null-modem serial cable. (See Appendix B for wiring options.)
NOTE: For a detailed description of the management features, refer to the user’s manual.
To download the Gigabit PoE+ Ethernet Managed Switch Eco user manual from the Web site:
1. Go to www.blackbox.com
2. Enter the part number (LPB5028A or LPB5052A) in the search box:
3. Click on the “Resources” tab on the product page, and select the document you wish to download.
724-746-5500 | blackbox.com
Page 15
Page 16
Chapter 3: Operation of Web-based Management
3. Operation of Web-based Management
3.1 Initial Configuration
This chapter explains how to configure and manage the LPB5028A or LPB5052A through the Web user interface. You can easily
access and monitor through any one switch port the switch status, including MIBs status, each port activity, Spanning tree status,
port aggregation status, multicast traffic, VLAN and priority status, even illegal access record and so on.
The default values of the LPB5028A are listed in the table below:
IP Addres s : 192.168.1.1
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.254
Username: admin
Password: blank
Password
After you configure the LPB5028A, you can browse to it. Type http://192.168.1.1 in the address row in a browser, and you will see
the login screen prompting you for the username and password to login and access authentication.
The default username is “admin” and password is empty. The first time you use the switch, enter the default username and password, and then click on the <Login> button. The login process now is completed.
NOTE: In the login menu, you have to input the complete username and password respectively; the LPB5028A will not give you a
shortcut to username automatically. This looks inconvenient, but is safer.
This supports a simple user management function allowing only one administrator to configure the system at a time. If two or
more users are using administrator’s identity, it will allow only the one who logs in first to configure the system. The rest of the
users, even with administrator’s identity, can only monitor the system. Users who have no administrator’s identity can only monitor the system, and a maximum of three users can login simultaneously to the LPB5028A or LPB5052A.
NOTE: When you login to the switch to manage it, you must first type the username, which, by default, is admin. The password is
blank, so after you type admin, press enter. The Web management page will appear.
You can manage the LPB5028A or LPB5052A switch Web UI via both ipv4 and ipv6. To optimize the display effect, we
recommend you use Microsoft IE 6.0 and above, Netscape V7.1 and above, or FireFox V1.00 and above with 1024 x 768
resolution. The switch supports a neutral Web browser interface.
NOTE: To enable the DHCP function, if you don’t have a DHCP server to provide IP addresses to the switch, use the switch’s
default IP address: 192.168.1.1.
Page 16
724-746-5500 | blackbox.com
Page 17
Chapter 3: Operation of Web-based Management
Figure 3-1. The login page.
NOTE: If you need to configure a function or parameter, follow the instructions in this User’s Guide. Or, you can access the
Switch’s help screens in the Web User Interface (UI).
724-746-5500 | blackbox.com
Page 17
Page 18
Chapter 3: Operation of Web-based Management
Page 18
Figure 3-2. Web help screen.
724-746-5500 | blackbox.com
Page 19
Chapter 3: Operation of Web-based Management
Connecting to Network Devices
The switch is designed to connect to 10-, 100-, or 1000-Mbps network cards in PCs and servers, as well as to other switches and
hubs. You can also connect it to remote devices using optional SFP transceivers.
Twisted-Pair Devices
Each device requires an unshielded twisted-pair (UTP) cable with RJ-45 connectors at both ends. Use Category 5, 5e, or 6 cable
for 1000BASE-T connections, and Category 5 or better for 100BASE-TX connections.
Cabling Guidelines
The RJ-45 ports on the switch support automatic MDI/MDI-X pin-out configuration, so you can use standard straight-through
twisted-pair cables to connect to any other network device (PCs, servers, switches, routers, or hubs).
See Appendix B for further information on cabling.
CAUTION: Do not plug a phone jack connector into an RJ-45 port. This will damage the switch. Use only twisted-pair cables with
RJ-45 connectors that conform to FCC standards.
3.2 Connecting to PCs, Servers, Hubs, and Switches
STEP 1: Attach one end of a twisted-pair cable segment to the device’s RJ-45 connector.
STEP 2: If the device is a network card and the switch is in the wiring closet, attach the other end of the cable segment to a
modular wall outlet that is connected to the wiring closet. (See the “Network Wiring Connections” section.) Otherwise, attach
the other end to an available port on the switch.
Make sure each twisted-pair cable does not exceed 328 feet (100 meters) in length.
NOTE: Avoid using flow control on a port connected to a hub unless it is actually required to solve a problem. Otherwise, back
pressure jamming signals may degrade overall performance for the segment attached to the hub.
STEP 3: As each connection is made, the Link LED (on the switch) corresponding to each port will light green (1000 Mbps) or
amber (100 Mbps) to indicate that the connection is valid.
3.3 Network Wiring Connections
Today, the punch-down block is an integral part of many of the newer equipment racks. It is actually part of the patch panel.
Instructions for making connections in the wiring closet with this type of equipment follow.
STEP 1: Attach one end of a patch cable to an available port on the switch, and the other end to the patch panel.
STEP 2: If not already in place, attach one end of a cable segment to the back of the patch panel where the punch-down block is
located, and the other end to a modular wall outlet.
Figure 3-3. Making twisted-pair connections.
724-746-5500 | blackbox.com
Page 19
Page 20
Chapter 3: Operation of Web-based Management
STEP 3: Label the cables to simplify future troubleshooting. See “Cable Labeling and Connection Records.”
Figure 3-4. Network Wiring Connections.
Page 20
724-746-5500 | blackbox.com
Page 21
Chapter 4: System
4. System
This chapter describes the basic configuration tasks, including system Information and management of the switch (Time, Account,
IP, Syslog, and SNMP).
4.1 System Information
After you login, the switch shows you the system information. This default page and tells you the basic system information,
including “Model Name,” “System Description,” “Contact,” “Device Name,” “System Up Time,” “BIOS Version,” “Firmware
Version,” “Hardware-Mechanical Version,” “Serial Number,” “Host IP Address,” “Host Mac Address,” “Device Port,” “RAM Size,”
and “Flash Size.” With this information, you will know the software version used, MAC address, serial number, how many ports
are good, and so on.
4.1.1 Info rm ation
The switch system information is provided here.
Web interface
To configure System Information in the Web interface:
1. Click SYSTEM, System, and Information.
2. Specify the contact information for the system administrator as well as the name and location of the switch. Also indicate the
local time zone by configuring the appropriate offset.
3. Click Refresh.
Parameter description:
• Model name: The model name of this device.
• System description: In this example, Gigabit PoE+ Ethernet Managed Switch Eco.
• Location: This user-defined parameter is where this switch is located.
Figure 4-1. System Information.
724-746-5500 | blackbox.com
Page 21
Page 22
Chapter 4: System
• Contact: To easily manage and maintain your device, you can configure this parameter through the device’s user interface or
SN M P.
• Device name: The name of the switch. User-defined.
• System Date: Show the system time of the switch. Its format is day of week, month, day, hours : minutes : seconds, year.
• System up time: The time accumulated since this switch was powered on. Its format is day, hour, minute, second.
• BIOS version: The version of the BIOS in this switch.
• Firmware version: The firmware version of this switch.
• Hardware-Mechanical version: The figure before the hyphen is the electronic hardware version; the one after the hyphen is the
mechanical version.
• Serial number: The serial number is assigned by the manufacturer.
• Host IP address: The IP address of the switch.
• Host MAC address: The Ethernet MAC address of the management agent in this switch.
• Subnet Mask: Displays the IP subnet mask assigned to the device.
• Gateway IP Address: Displays the default gateway IP address assigned to the device.
• Host MAC Address: Displays the Ethernet MAC address assigned to the device.
• Console Baud rate: Displays the baud rate of RS-232(COM) port.
• RAM Size: Displays the RAM size of the system.
• Flash Size: Displays the flash size of the system.
• Bridge FDB Size: Displays the bridge forwarding database size of the device.
• Transmit Queue: Displays the information about the switch’s transmit priority queue.
• Maximum Frame Size: Displays the information about switch supported maximum frame size.
4.1.2 Configuration
You can identify the system by configuring the contact information, name, and location of the switch.
Web interface
To configure System Information in the Web interface:
1. Click System, System Information, Configuration.
2. Write System Contact, System Name, System Location information in this page.
3. Click Apply.
Page 22
Figure 4-2. System Information configuration.
724-746-5500 | blackbox.com
Page 23
Chapter 4: System
Parameter description:
• System Contact: The textual identification of the contact person for this managed node, together with information on how to
contact this person. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 32 to 126.
• System Name: An administratively assigned name for this managed node. By convention, this is the node's fully-qualified
domain name. A domain name is a text string drawn from the alphabet (A-Za-z), digits (0-9), minus sign (-). No space characters are permitted as part of a name. The first character must be an alpha character. And the first or last character must not be
a minus sign. The allowed string length is 0 to 255.
• System Location: The physical location of this node (e.g., telephone closet, 3rd floor). The allowed string length is 0 to 255, and
the allowed content is the ASCII characters from 32 to 126.
4.1.3 CPU Load
This page displays the CPU load, using an SVG graph. The load is measured as averaged over the last 100 ms, 1 sec ,and 10 seconds intervals. The last 120 samples are graphed, and the last numbers are displayed as text as well. To display the SVG graph,
your browser must support the SVG format. Consult the SVG Wiki for more information on browser support. Specifically, at the
time of writing, Microsoft Internet Explorer will need to have a plug-in installed to support SVG.
Web interface
To configure System Information in the Web interface:
1. Click System, System Information, CPU Load.
2. Display the CPU Load on the screen.
3. Click “Auto-refresh.”
Figure 4-3. CPU Load.
Parameter description:
• Auto-refresh: Enables the device to refresh the log automatically.
NOTE: “From” and “to” displays what you set in the “From” and “To” field information.
724-746-5500 | blackbox.com
Page 23
Page 24
Chapter 4: System
4.2 Time
This page teaches users how to configure the switch time, including Time Configuration and NTP Configuration.
4.2.1 Manual
The switch provides manual and automatic ways to set the system time via NTP. For manual setting, simply input “Year,”
“Month,” “Day,” “Hour,” “Minute,” and “Second” within the valid value range indicated in each item.
Web Interface
To configure Time in the Web interface:
1. Click Time, Manual.
2. Specify the Time parameter in manual parameters.
3. Click Apply.
Parameter description:
• Clock Source: Select clock source for the LPB5028A or LPB5052A. You can select “Use local Settings” or “Use NTP Server” for
LPB5028A or LPB5052A time clock source.
• Local Time: Show the current time of the system.
• Time Zone Offset: Provide the timezone offset relative to UTC/GMT. The offset is given in minutes east of GMT. The valid range
is from -720 to 720 minutes
Page 24
Figure 4-4. Time configuration screen.
724-746-5500 | blackbox.com
Page 25
Chapter 4: System
• Daylight Saving: Daylight saving is adopted in some countries. If set, it will adjust the time lag or in advance in unit of hours,
according to the starting date and the ending date. For example, if you set the day light saving to be 1 hour, when the time
passes over the starting time, the system time will be increased one hour after one minute at the time since it passed over. And
when the time passes over the ending time, the system time will be decreased one hour after one minute at the time since it
passed over.
The valid configurable daylight saving time supported by the switch is –5 – +5 step one hour. It does not have to adjust current
time, and you don’t have to set the starting/ending date. If you set daylight saving to be non-zero, you have to set the starting/
ending date as well; otherwise, the daylight saving function will not be activated.
• Time Set Offset: Provide the Daylight saving time set offset. The offset is given in minutes east of GMT. The valid range is from
1 to 1440 minutes. default is 60 mins.
• Daylight Savings Type: Provide the Daylight savings type selection. You can select “ By Dates” or “Recurring” two type for
Daylight saving type.
• From: To configure date and time when Daylight savings starts, the format is “YYYYMM-DD HH:MM.”
• To: To configure date and time when Daylight savings ends, the format is “YYYY-MMDD HH:MM.”
NOTE: The “from” and “to” fields display the “From” and “To” field information you set.
4.2.2 NTP
NTP is Network Time Protocol and is used to sync the network time based Greenwich Mean Time (GMT). Use the NTP mode to
select a built-in NTP time server or to manually specify a user-defined NTP server as well as Time Zone. The switch will sync the
time after you press the <Apply> button. Though it synchronizes the time automatically, NTP does not update the time
periodically without a user’s processing.
Time Zone is an offset time off GMT. You have to select the time zone first and then perform time sync via NTP because the
switch will combine this time zone offset and updated NTP time to display the local time; otherwise, you will not able to get the
correct time. The switch supports a configurable time zone from –12 to +13 step 1 hour.
Default Time zone: +8 Hrs.
Web Interface
To configure Time in the Web interface:
1. Click SYSTEM, NTP.
2. Manually specify the Time parameter.
3. Click Apply.
Figure 4-5. The NTP configuration.
724-746-5500 | blackbox.com
Page 25
Page 26
Chapter 4: System
Parameter description:
• Server 1to 5: Provide the NTP IPv4 or IPv6 address of this switch. IPv6 address consists of 128-bit records represented as eight
fields of up to four hexadecimal digits with a colon separating each field (:). For example, 'fe80:: 215:c5ff:fe03:4dc7’. The symbol '::' is a special syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it
can only appear once. It can also represent a legally valid IPv4 address. For example, ':: 192.1.2.34’.
• Buttons: These buttons are displayed on the NTP page:
Apply – Click to save changes.
Reset - Click to undo any changes made locally and revert to previously saved values.
4.3 Account
In this function, only the administrator can create, modify, or delete the username and password. The administrator can modify
other guest identities’ password without confirming the password, but must modify the administrator-equivalent identity. Guestequivalent identity can modify his password only.
NOTE: You must confirm administrator/guest identity in the Authorization field in advance before configuring the username and
password. Only one administrator is allowed to exist and cannot be deleted. In addition, up to 4 guest accounts can be
created.
4. 3.1 User s
This page provides an overview of the current users. Currently, the only way to login as another user on the web server is to close
and reopen the browser.
Web Interface
To configure an Account in the web interface:
1. Click SYSTEM, Account, Users.
2. Click Add new user.
3. Specify the User Name parameter.
4. Click Apply.
Page 26
Figure 4-6. The User’s Account configuration.
724-746-5500 | blackbox.com
Page 27
Chapter 4: System
Parameter description:
• User Name: The name identifying the user. This is also a link to Add/Edit User.
• Password: Type the password. The allowed string length is 0 to 255, and the allowed content is the ASCII characters from 32 to
126.
• Password (again): Type the password again. You must type the same password again in the field.
• Privilege Level: The privilege level of the user. The allowed range is 1 to 15. If the privilege level value is 15, it can access all
groups; i.e., it is granted the full control of the device. But other values need to refer to each group privilege level. A user's privilege should be same or greater than the group privilege level to have the access to that group. By default, most groups privilege
level 5 has read-only access and privilege level 10 has read-write access. And the system maintenance (software upload, factory
defaults, and etc.) need user privilege level 15. Generally, the privilege level 15 can be used for an administrator account, privilege level 10 for a standard user account and privilege level 5 for a guest account.
4.3.2 Privilege Level
This page provides an overview of the privilege levels. The switch provides user-set Account, Aggregation, Diagnostics, EEE, GARP,
GVRP, IP, IPMC Snooping, LACP, LLDP, LLDP, MED, MAC Table, MRP, MVR, MVRP, Maintenance, Mirroring, POE, Ports, Private
VLANs QoS. SMTP, SNMP Security, Spanning Tree, System, Trap, Event, VCL, VLANs, Voice, and VLAN Privilege Levels from 1 to
15.
Web Interface
To configure Privilege Level in the Web interface:
1. Click SYSTEM, Account, Privilege Level.
2. Specify the Privilege parameter.
3. Click Apply.
724-746-5500 | blackbox.com
Page 27
Page 28
Chapter 4: System
Figure 4-7. The Privilege Level configuration screen.
Parameter description:
• Group Name: The name identifying the privilege group. In most cases, a privilege level group consists of a single module (e.g.,
LACP, RSTP, or QoS), but a few of them contain more than one. The following description defines these privilege level groups in
detail:
System: Contact, Name, Location, Timezone, Log.
Page 28
724-746-5500 | blackbox.com
Page 29
Chapter 4: System
Security: Authentication, System Access Management, Port (contains Dot1x port, MAC based and the MAC Address Limit),
ACL, HTTPS, SSH, ARP, Inspection, and IP source guard.
IP: Everything except “ping.”
Port: Everything except “VeriPHY.”
Diagnostics: “ping” and “VeriPHY.”
Maintenance: System Reboot, System Restore Default, System Password, Configuration Save, Configuration Load, and Firmware
Load. Web Users, Privilege Levels, and everything in Maintenance.
• Privilege Levels: Every group has an authorization Privilege level for the following sub groups: configuration read-only,
configuration/execute read-write, status/statistics read-only, status/statistics read-write (e.g. for clearing of statistics). User
Privilege should be same or greater than the authorization Privilege level to have access to that group.
4.4 IP
IP is an acronym for Internet Protocol. It is a protocol used for communicating data across an internet network.
IP is a “best effort” system, which means that no packet of information sent over is assured to reach its destination in the same
condition it was sent. Each device connected to a Local Area Network (LAN) or Wide Area Network (WAN) is given an Internet
Protocol address, and this IP address is used to identify the device uniquely among all other devices connected to the extended
network.
The current version of the Internet protocol is IPv4, which has 32-bit Internet Protocol addresses, allowing for in excess of four billion unique addresses. This number is reduced drastically by the practice of webmasters taking addresses in large blocks, the bulk
of which remain unused. There is a rather substantial movement to adopt a new version of the Internet Protocol, IPv6, which
would have 128-bit Internet Protocol addresses. This number can be represented roughly by a three with thirty-nine zeroes after
it. However, IPv4 is still the protocol of choice for most of the Internet.
4.4.1 IPV4
The IPv4 address for the switch could be obtained via DHCP Server for VLAN 1. To manually configure an address, you need to
change the switch's default settings to values that are compatible with your network. You may also need to a establish a default
gateway between the switch and management stations that exist on another network segment.
Configure the switch-managed IP information on this page.
The Configured column is used to view or change the IP configuration.
The Current column is used to show the active IP configuration.
Web Interface
To configure an IP address in the web interface:
1. Click System, IP Configuration.
2. Specify the IPv4 settings, and enable DNS proxy service if required.
3. Click Apply.
724-746-5500 | blackbox.com
Page 29
Page 30
Chapter 4: System
Figure 4-8. The IP configuration screen.
Parameter description:
• DHCP Client: Enable the DHCP client by checking this box. If DHCP fails and the configured IP address is zero, DHCP will retry. If
DHCP fails and the configured IP address is non-zero, DHCP will stop and the configured IP settings will be used. The DHCP client will announce the configured System Name as hostname to provide DNS lookup.
• IP Address : Provide the IP address of this switch in dotted decimal notation.
• IP Mask: Provide the IP mask of this switch dotted decimal notation.
• IP Router: Provide the IP address of the router in dotted decimal notation.
• SNTP Server: Provide the IP address of the SNTP Server in dotted decimal notation.
• DNS Server: Provide the IP address of the DNS Server in dotted decimal notation.
• VLAN ID:Provide the managed VLAN ID. The allowed range is 1 to 4095.
• DNS Proxy : When DNS proxy is enabled, DUT will relay DNS requests to the current configured DNS server on DUT, and reply
as a DNS resolver to the client device on the network.
4.4.2 IPV6
This section describes how to configure the switch-managed IPv6 information. The Configured column is used to view or change
the IPv6 configuration.
Configure the switch-managed IPv6 information on this page.
The Configured column is used to view or change the IPv6 configuration.
The Current column is used to show the active IPv6 configuration.
Web Interface
To configure Management IPv6 of the switch in the web interface:
1. Click System, IPv6 Configuration.
2. Specify the IPv6 settings, and enable Auto Configuration service if required.
3. Click Apply.
Page 30
724-746-5500 | blackbox.com
Page 31
Chapter 4: System
Figure 4-9. The IPv6 configuration screen.
Parameter description:
• Auto Configuration: Enable IPv6 auto-configuration by checking this box. If it fails, the configured IPv6 address is zero. The
router may delay responding to a router solicitation for a few seconds; the total time needed to complete auto-configuration
can be significantly longer.
• Address: Provide the IPv6 address of this switch. IPv6 address is in 128-bit records represented as eight fields of up to four hexa-
decimal digits with a colon separating each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::' is a special syntax
that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it can only appear once. It
can also represent a legally valid IPv4 address. For example, '::192.1.2.34'.
• Prefix: Provide the IPv6 Prefix of this switch. The allowed range is 1 to 128.
• Router: Provide the IPv6 gateway address of this switch. IPv6 address is in 128-bit records represented as eight fields of up to
four hexadecimal digits with a colon separating each field (:). For example, 'fe80::215:c5ff:fe03:4dc7'. The symbol '::' is a special
syntax that can be used as a shorthand way of representing multiple 16-bit groups of contiguous zeros; but it can only appear
once. It can also represent a legally valid IPv4 address. . For example, '::192.1.2.34'.
4.5 Syslog
The Syslog is a standard for logging program messages. It allows separation of the software that generates messages from the
system that stores them and the software that reports and analyzes them. It can be used as well a generalized informational,
analysis and debugging messages. It is supported by a wide variety of devices and receivers across multiple platforms.
4.5.1 Configuration
This section describes how to configure the system log and provide a wide variety of devices and receivers across multiple platforms.
Web Interface
To configure Syslog configuration in the web interface:
1. Click SYSTEM, Syslog.
2. Specify the syslog parameters includes IP Address of Syslog server and Port number.
3. Evoke the Sylog to enable it.
4. Click Apply.
724-746-5500 | blackbox.com
Page 31
Page 32
Chapter 4: System
Figure 4-10. The System Log configuration screen.
Parameter description:
• Server Mode: Indicates the server mode operation. When the mode operation is enabled, the syslog message will send out to
syslog server. The syslog protocol is based on UDP communication and received on UDP port 514 and the syslog server will not
send acknowledgments back sender since UDP is a connectionless protocol and it does not provide acknowledgments. The syslog packet will always send out even if the syslog server does not exist. Possible modes are:
Enabled: Enable server mode operation.
Disabled: Disable server mode operation.
• Server Address 1 and 2: Indicates the IPv4 host address of syslog server 1 and server 2 (For redundancy). If the switch provide
DNS feature, it also can be a host name.
• Syslog Level: Indicates what kind of message will send to syslog server. Possible modes are: Info: Send informations, warnings
and errors. Warning: Send warnings and errors. Error: Send errors.
4.5.2 Log
This section describes the switch's the system log information display.
Web Interface
To display the log configuration in the web interface:
1. Click Syslog, Log.
2. Display the log information.
Figure 4-11. The System Log configuration screen.
Page 32
724-746-5500 | blackbox.com
Page 33
Chapter 4: System
Parameter description:
• Auto-refresh: The device will refresh the log automatically.
• Level: Level of the system log entry. The following level types are supported:
Information: Information level of the system log.
Warning: Warning level of the system log.
Error: Error level of the system log.All: All levels.
• ID: ID (>= 1) of the system log entry.
• Time: It will display the system log record by device time.
• Message: It will display the log detail message. The message of the system log entry.
• Upper right icon (Refresh, clear,….): You can click this to refresh the system log or clear it manually. Click on the arrow icons to
go go to the next/up page or entry.
4.5.3 Detailed Log
This section describes the screen that displays the switch’s detailed log information.
Web Interface
To display the detailed log configuration in the web interface:
1. Click Syslog, Detailed Log.
2. Display the log information.
Figure 4-12. Detailed System Log Information screen.
Parameter description:
• ID: The ID (>= 1) of the system log entry.
• Message: The detailed message of the system log entry.
• Upper right icon (Refresh, clear,….): You can click these icons to refresh the system log or clear it manually: use the arrow icons
for next/up page or entry.
724-746-5500 | blackbox.com
Page 33
Page 34
Chapter 4: System
4.6 SNMP
Any Network Management System (NMS) running the Simple Network Management Protocol (SNMP) can manage the Managed
devices equipped with an SNMP agent, provided that the Management Information Base (MIB) is installed correctly on the managed devices. The SNMP is a protocol that is used to govern the transfer of information between SNMP manager and agent and
traverses the Object Identity (OID) of the management Information Base (MIB), described in the form of SMI syntax. SNMP agent
is running on the switch to respond to the request issued by SNMP manager.
Basically, it is passive except when issuing the trap information. The switch supports a switch to turn on or off the SNMP agent. If
you set the SNMP field to “Enable,” the SNMP agent will start up. All supported MIB OIDs, including RMON MIB, can be accessed
via SNMP manager. If the SNMP field is set to “Disable,” the SNMP agent will be de-activated, and the related Community Name,
Trap Host IP Address, Trap, and all MIB counters will be ignored.
4.6 .1 Syst em
This section describes how to configure an SNMP System on the switch. This function is used to configure SNMP settings, community name, trap host, and public traps, as well as SNMP throttle. An SNMP manager must pass the authentication by identifying both community names, then it can access the MIB information of the target device. So, both parties must have the same
community name. Once you complete the setting, click the <Apply> button, and the setting takes effect.
Web Interface
To display the SNMP System configuration in the web interface:
1. Click SNMP, System.
2. Evoke SNMP State to enable or disable the SNMP function.
3. Specify the Engine ID.
4. Click Apply.
Figure 4-13. The SNMP System Configuration screen.
Parameter description:
These parameters are displayed on the SNMP System Configuration page:
• SNMP State: The SNMP state parameter activates or deactivates SNMP.
Enable: Enable SNMP state operation.
Disable: Disable SNMP state operation.
Default: Enable.
• Engine ID: SNMPv3 engine ID. syntax: 0-9,a-f,A-F, min 5 octet, max 32 octet, fifth octet can't input 00. IF change the Engine ID
that will clear all original user.
Page 34
724-746-5500 | blackbox.com
Page 35
Chapter 4: System
4.6.2 Configuration
The function is used to configure SNMP communities. To enable new community statistics, check the button ▼, and choose
<Enable> to configure the SNMP function.
Web Interface
To display the SNMP Configuration in the web interface:
1. Click SNMP, Configuration.
2. Select SNMP State to enable or disable the SNMP function.
3. Click Apply.
Figure 4-14. The SNMP Configuration menu.
4.6.3 Communities
The function is used to configure SNMPv3 communities. The Community and UserName is unique. To create a new community
account, check <Add new community> button, and enter the account information, then check <Apply>. Max Group Number : 4.
Web Interface
To display the configure SNMP Communities in the web interface:
1. Click SNMP, Communities.
2. Click Add new community.
3. Specify the SNMP communities parameters.
4. Click Apply.
5. If you want to modify or clear the setting, then click Reset.
Figure 4-15. The SNMPv1/v2 Communities Security Configuration screens.
724-746-5500 | blackbox.com
Page 35
Page 36
Chapter 4: System
Parameter description:
• Delete: Check to delete the entry. It will be deleted during the next save.
• Community: Indicates the community access string to permit access to SNMPv3 agent. The allowed string length is 1 to 32, and
the allowed content is ASCII characters from 33 to 126. The community string will be treated as security name and map an
SNMPv1 or SNMPv2c community string.
• UserName: The UserName access string permits access to SNMPv3 agent. The length of “UserName” string is restricted to 1–32.
• Source IP: Indicates the SNMP access source address. A particular range of source sddresses can be used to restrict source
subnet when combined with source mask.
• Source Mask: Indicates the SNMP access source address mask
4.6.4 Users
This function is used to configure SNMPv3 user. The Entry index key is UserName. To create a new UserName account, check
<Add new user> button and enter the user information, then check <Apply>. Max Group Number : 10.
Web Interface
To display the configure SNMP Users in the web interface:
1. Click SNMP, Users.
2. Specify the Privilege parameter.
3. Click Apply.
Parameter description:
Figure 4-16. The SNMP Users Configuration screens.
• Delete: Check to delete the entry. It will be deleted during the next save.
• User Name: A string identifying the user name that this entry should belong to. The allowed string length is 1 to 32, and the
allowed content is ASCII characters from 33 to 126.
• Security Level Indicates the security model that this entry should belong to. Possible security models are:
NoAuth, NoPriv: No authentication and no privacy.
Auth, NoPriv: Authentication and no privacy.
Page 36
724-746-5500 | blackbox.com
Page 37
Chapter 4: System
Auth, Priv: Authentication and privacy.
The value of security level cannot be modified if an entry already exists. Make sure the value is set correctly.
• Authentication Protocol: Indicates the authentication protocol that this entry should belong to. Possible authentication protocols
are:
None: No authentication protocol.
MD5: An optional flag to indicate that this user uses MD5 authentication protocol.
SHA: An optional flag to indicate that this user uses SHA authentication protocol.
The security level value cannot be modified if entry already exists. Make sure the value is set correctly.
• Authentication Password: A string identifying the authentication password phrase. For MD5 authentication protocol, the
allowed string length is 8 to 32. For SHA authentication protocol, the allowed string length is 8 to 40. The allowed content is
ASCII characters from 33 to 126.
• Privacy Protocol: Indicates the privacy protocol that this entry should belong to. Possible privacy protocols are:
None: No privacy protocol.
DES: An optional flag to indicate that this user uses DES authentication protocol.
• Privacy Password: A string identifying the privacy password phrase. The allowed string length is 8 to 32, and the allowed
content is ASCII characters from 33 to 126.
4.6.5 Groups
The function is used to configure SNMPv3 groups. The Entry index key are Security Model and Security Name. To create a new
group account, check <Add new group> button, and enter the group information then check <Apply>. Max Group Number : v1:
2, v2: 2, v3:10.
Web Interface
To display the configure SNMP Groups in the web interface:
1. Click SNMP, Groups.
2. Specify the Privilege parameter.
3. Click Apply.
Figure 4-17. The SNMP Groups Configuration screen.
724-746-5500 | blackbox.com
Page 37
Page 38
Chapter 4: System
Parameter description:
• Delete: Check to delete the entry. It will be deleted during the next save.
• Security Model: Indicates the security model that this entry should belong to. Possible security models are:
v1: Reserved for SNMPv1.
v2c: Reserved for SNMPv2c.
usm: User-based Security Model (USM).
• Security Name: A string identifying the security name that this entry should belong to. The allowed string length is 1 to 32, and
the allowed content is ASCII characters from 33 to 126.
• Group Name: A string identifying the group name that this entry should belong to. The allowed string length is 1 to 32, and
the allowed content is ASCII characters from 33 to 126.
4.6.6 Views
The function is used to configure SNMPv3 view. The Entry index keys are OID Subtree and View Name. To create a new view
account, check the <Add new view> button and enter the view information, then check <Apply>. Max Group Number : 28.
Configure SNMPv3 view table on this page. The entry index keys are View Name and OID Subtree.
Web Interface
1. Click SNMP, Views.
2. Click Add new View.
3. Specify the SNMP View parameters.
4. Click Apply.
5. If you want to modify or clear the setting, then click Reset.
Figure 4-18. The SNMP Views Configuration screen.
Parameter description:
• Delete: Check to delete the entry. It will be deleted during the next save.
Page 38
724-746-5500 | blackbox.com
Page 39
Chapter 4: System
• View Name: A string identifying the view name that this entry should belong to. The allowed string length is 1 to 32, and the
allowed content is ASCII characters from 33 to 126.
• View Type: Indicates the view type that this entry should belong to. Possible view types are:
included: An optional flag to indicate that this view subtree should be included.
excluded: An optional flag to indicate that this view subtree should be excluded.
In general, if a view entry's view type is “excluded,” there should be another view entry existing with view type as “included”
and its OID subtree should overstep the “excluded” view entry.
• OID Subtree: The OID defining the root of the subtree to add to the named view. The allowed OID length is 1 to 128. The
allowed string content is a digital number or asterisk(*).
• Apply: Click the apply icon to apply the configuration change to ROM.
4.6.7 Access
This function is used to configure SNMPv3 access. The Entry index keys are Group Name, Security Model, and Security level. To
create a new access account, check <Add new access> button and enter the access information, then check <Apply>. Max Group
Number: 14.
Web Interface
To display the configure SNMP Access in the web interface:
1. Click SNMP, Access.
2. Click Add new Access.
3. Specify the SNMP Access parameters.
4. Click Apply.
5. If you want to modify or clear the setting, then click Reset.
.
Figure 4-19. SNMP Access Configuration screens.
Parameter description:
• Delete: Check to delete the entry. It will be deleted during the next save.
724-746-5500 | blackbox.com
Page 39
Page 40
Chapter 4: System
• Group Name: A string identifying the group name that this entry should belong to. The allowed string length is 1 to 32, and the
allowed content is ASCII characters from 33 to 126.
• Security Model: Indicates the security model that this entry should belong to. Possible security models are:
any: Any security model accepted(v1|v2c|usm).
v1: Reserved for SNMPv1.
v2c: Reserved for SNMPv2c.
usm: User-based Security Model (USM).
• Security Level: Indicates the security level that this entry should belong to. Possible security levels are:
NoAuth, NoPriv: No authentication and no privacy.
Auth, NoPriv: Authentication and no privacy.
Auth, Priv: Authentication and privacy.
• Read View Name: The name of the MIB view defining the MIB objects for which this request may request the current values.
Th e allowed string length is 1 to 32, and the allowed content is ASCII characters from 33 to 126.
• Write View Name: The name of the MIB view defining the MIB objects for which this request may potentially set new values.
The allowed string length is 1 to 32, and the allowed content is ASCII characters from 33 to 126.
4.6.8 Trap
The function is used to configure SNMP trap. To create a new trap account, check the <No number> button, and enter the trap
information, then check <Apply>. Max Group Number : 6.
Web Interface
To configure SNMP Trap setting:
1. Click SNMP, Trap.
2. Display the SNMP Trap Hosts information table.
3. Choice a entry to display and modify the detail parameters or click delete button to delete the trap hosts entry.
Page 40
724-746-5500 | blackbox.com
Page 41
Chapter 4: System
Figure 4-20. The SNMP Trap Host Configuration screen.
Parameters description:
• Delete: Check <Delete> entry then check the <Apply> button, and entry will be deleted.
• Trap Version: You may choose v1, v2c or v3 trap.
• Server IP: Check to assign the SNMP Host IP address.
• UDP Port: Check to assign Port number. Default: 162.
• Community / Security Name: The length of the “Community / Security Name” string is restricted to 1–32.
• Security Level: Indicates what kind of message will send to Security Level.
Possible modes are:
Info: Send informations, warnings and errors.
Warning: Send warnings and errors.
Error: Send errors.
• Security Level: There are three choices.
NoAuth, NoPriv: No authentication and no privacy.
Auth, NoPriv: Authentication and no privacy.
Auth, Priv: Authentication and privacy.
• Authentication Protocol: You can choose MD5 or SHA for authentication.
724-746-5500 | blackbox.com
Page 41
Page 42
Chapter 4: System
• Authentication Password: The length of “MD5 Authentication Password” is restricted to 8–32. The length of “SHA
Authentication Password” is restricted to 8–40.
• Privacy Protocol: You can set DES encryption for UserName.
• Privacy Password: The length of “Privacy Password” is restricted to 8–32.
Page 42
724-746-5500 | blackbox.com
Page 43
Chapter 5: Configuration
5. Configuration
This chapter describes all of the basic network configuration tasks, including the Ports, Layer 2 network protocol (e.g. VLANs,
QoS, IGMP, ACLs and PoE etc.) and any setting of the switch.
5.1 Po rt
The section describes how to configure the Port detail parameters of the switch. You can enable or disable switch ports, and
monitor its content or status.
5.1.1 Configura tio n
This chapter describes how to view the current port configuration and how to configure ports to non-default settings, including:
• Linkup/Linkdown
• Speed (Current and configured)
• Flow Control (Current Rx, Current Tx and Configured)
• Maximum Frame Size
• Excessive Collision Mode
• Power Control
Web Interface
To configure a Current Port Configuration in the web interface:
1. Click Configuration, Port, then Configuration.
2. Specify the Speed Configured, Flow Control, Maximum Frame size, Excessive Collision mode, and Power Control.
3. Click Apply.
724-746-5500 | blackbox.com
Page 43
Page 44
Chapter 5: Configuration
Figure 5-1. The Port Configuration screen.
Parameter description:
• Port: This is the logical port number for this row.
• Link: The current link state is displayed graphically. Green indicates the link is up and red that it is down.
• Current Link Speed: Provides the current link speed of the port.
• Configured Link Speed: Select any available link speed for the given switch port.
- Auto Speed selects the highest speed that is compatible with a link partner.
- Disabled disables the switch port operation.
• Flow Control: When Auto Speed is selected on a port, it indicates the flow control capability that is advertised to the link
partner. When a fixed-speed setting is selected, that is what is used. The Current Rx column indicates whether pause frames on
the port are obeyed, and the Current Tx column indicates whether pause frames on the port are transmitted. The Rx and Tx
settings are determined by the result of the last Auto-Negotiation.
Check the configured column to use flow control. This setting is related to the setting for Configured Link Speed.
• Maximum Frame Size: Enter the maximum frame size allowed for the switch port, including FCS.
• Excessive Collision Mode: Configure port transmit collision behavior.
- Discard: Discard frame after 16 collisions (default).
- Restart: Restart backoff algorithm after 16 collisions.
Page 44
724-746-5500 | blackbox.com
Page 45
Chapter 5: Configuration
• Power Control: The Usage column shows the current percentage of the power consumption per port. The Configured column
allows for changing the power savings mode parameters per port.
- Disabled: All power savings mechanisms disabled.
- ActiPHY: Link down power savings enabled.
- PerfectReach: Link up power savings enabled.
- Enabled: Both link up and link down power savings enabled.
• Buttons
- Apply: Click to save changes.
- Reset: Click to undo any changes made locally and revert to previously saved values.
• Upper right icon (Refresh): You can click this icon to refresh the Port link Status manually.
5.1.2 Port Description
The section describes how to configure the port’s alias or any descriptions for the Port Identity. Enter an alphanumeric string
describing the full name and version identification for the system’s hardware type, software version, and networking application.
Web Interface
To configure a Port Description in the web interface:
1. Click Configuration, Port, then Port Description.
2. Specify the port alias or description in an alphanumeric string describing the full name and version identification for the
system’s hardware type, software version, and networking application.
3. Click Apply.
Parameter description:
• Port: This is the logical port number for this row.
Figure 5-2. The Port Configuration screen.
724-746-5500 | blackbox.com
Page 45
Page 46
Chapter 5: Configuration
• Description: Description of device ports can not include “ # % & ‘ + \.
• Buttons:
Apply: Click to save changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
5.1.3 Traffic Overview
The section describes to the Port statistics information and provides overview of general traffic statistics for all switch ports.
Web Interface
To Display the Port Statistics Overview in the web interface:
1. Click Configuration, Port, then Traffic Overview.
2. If you want to auto-refresh, then you need to select “Auto-refresh.”
3. Click “ Refresh“ to refresh the port statistics or click “Clear” to clear all information.
Parameter description:
• Port: The logical port for the settings contained in the same row.
• Packets: The number of received and transmitted packets per port.
• Bytes: The number of received and transmitted bytes per port.
• Errors: The number of frames received in error and the number of incomplete transmissions per port.
• Drops: The number of frames discarded due to ingress or egress congestion.
• Filtered: The number of received frames filtered by forwarding.
• Auto-refresh: Click on the auto-refresh icon and the device will refresh the information automatically.
Page 46
Figure 5-3. The Port Statistics Overview screen.
724-746-5500 | blackbox.com
Page 47
Chapter 5: Configuration
• Upper right icon (Refresh, Clear): Click on these icons to refresh the Port Statistics information manually. Click Clear to clean up
all Port Statistics.
5.1.4 Detailed Statistics
The section describes how to provide detailed traffic statistics for a specific switch port. Use the port select box to select which
switch port details to display.
The displayed counters are the totals for receive and transmit, the size counters for receive and transmit, and the error counters for
receive and transmit.
Web Interface
To display the per Port Port detailed Statistics Overview in the web interface:
1. Click Configuration, Port, then Detailed Port Statistics.
2. Scroll the Port Index to select which port you want to show in the Detailed Port Statistics overview.
3. If you want to auto-refresh the information then you need to select “Auto-refresh.”
4. Click “Refresh” to refresh the port detailed statistics or click “Clear” to clear all information.
Figure 5-4. The Port Detail Statistics Overview screen.
Parameter description:
• Auto-refresh: Select auto-refresh to refresh the Port Statistics information automatically.
• Upper left scroll bar: Select the port for which you want to display the Port statistics: “Port-0”, “Port-1…”
724-746-5500 | blackbox.com
Page 47
Page 48
Chapter 5: Configuration
Receive Total and Transmit Total
• Rx and Tx Packets: The number of received and transmitted (good and bad) packets.
• Rx and Tx Octets: The number of received and transmitted (good and bad) bytes. Includes FCS, but excludes framing bits.
• Rx and Tx Unicast: The number of received and transmitted (good and bad) unicast packets.
• Rx and Tx Multicast: The number of received and transmitted (good and bad) multicast packets.
• Rx and Tx Broadcast: The number of received and transmitted (good and bad) broadcast packets.
• Rx and Tx Pause: A count of the MAC Control frames received or transmitted on this port that have an opcode indicating a
PAUSE operation.
Receive and Transmit Size Counters
The number of received and transmitted (good and bad) packets split into categories based on their respective frame sizes.
Receive and Transmit Queue Counters
The number of received and transmitted packets per input and output queue.
Receive Error Counters
• Rx Drops: The number of frames dropped due to lack of receive buffers or egress congestion.
• Rx CRC/Alignment : The number of frames received with CRC or alignment errors.
• Rx Undersize: The number of short 1 frames received with valid CRC.
• Rx Oversize: The number of long 2 frames received with valid CRC.
• Rx Fragments: The number of short 1 frames received with invalid CRC.
• Rx Jabber: The number of long 2 frames received with invalid CRC.
• Rx Filtered: The number of received frames filtered by the forwarding process.
Short frames are frames that are smaller than 64 bytes.
Long frames are frames that are longer than the configured maximum frame length for this port.
Transmit Error Counters
• Tx Drops: The number of frames dropped due to output buffer congestion.
• Tx Late/Exc. Coll.: The number of frames dropped due to excessive or late collisions.
• Auto-refresh: Select auto-refresh to refresh the Queuing Counters automatically.
• Upper right icon (Refresh, clear): Click on these icons to refresh the Port Detail Statistics or clear them manually.
5.1.5 Qos Statistics
You can display the QoS detailed Queuing counters for a specific switch port or for the different queues for all switch ports.
Web Interface
To display the Queueing Counters in the web interface:
1. Click Configuration, Port, then QoS Statistics.
2. If you want to auto-refresh the information, select “Auto-refresh.”
3. Click “ Refresh“ to refresh the Queueing Counters or click “Clear” to clear all information.
Page 48
724-746-5500 | blackbox.com
Page 49
Chapter 5: Configuration
Figure 5-5. The Queuing Counters Overview screen.
Parameter description:
• Port: The logical port for the settings contained in the same row.
• Qn: Qn is the Queue number, QoS queues per port. Q0 is the lowest priority queue.
• Rx/Tx: The number of received and transmitted packets per queue.
• Auto-refresh: Select auto-refresh to refresh the Queuing Counters automatically.
• Upper right icon (Refresh, clear): Click on these icons to refresh the Queuing Counters or clear them manually.
5.1.6 SFP Information
The switch can display the SFP module detail information when you connect the module to the switch. The information includes:
Connector type, Fiber type, wavelength, baud rate, and Vendor OUI, etc.
Web Interface
To display the SFP information in the web interface:
1. Click Configuration, Port, then SFP Information.
2. Display the SFP Information.
724-746-5500 | blackbox.com
Page 49
Page 50
Chapter 5: Configuration
Figure 5-6. SFP Information Overview screen.
Parameter description:
• Connector Type: Display the connector type, for instance, UTP, SC, ST, LC and so on.
• Fiber Type: Display the fiber mode, for instance, Multi-Mode, Single-Mode.
• Tx Central Wavelength: Display the fiber optical transmitting central wavelength, for instance, 850 nm, 1310 nm, 1550 nm, and
so on.
• Baud Rate: Display the maximum baud rate of the fiber module supported, for instance, 10 M, 100 M, 1 G and so on.
• Vendor OUI: Display the manufacturer's OUI code, which is assigned by IEEE.
• Vendor Name: Display the company name of the module manufacturer.
• Vendor P/N: Display the product name assigned by the module manufacturer.
• Vendor Rev (Revision): Display the module revision.
• Vendor SN (Serial Number): Show the serial number assigned by the manufacturer.
• Date Code: Show the date this SFP module was made.
• Temperature: Show the current temperature of the SFP module.
• Vcc: Show the working DC voltage of the SFP module.
• Mon1(Bias) mA: Show the Bias current of the SFP module.
• Mon2(TX PWR): Show the transmit power of the SFP module.
• Mon3(RX PWR): Show the receiver power of the SFP module.
Page 50
724-746-5500 | blackbox.com
Page 51
Chapter 5: Configuration
5.2 ACL
The LPB5028A or LPB5052A switch access control list (ACL) is probably the most commonly used object in the IOS. It is used for
packet filtering but also for selecting types of traffic to be analyzed, forwarded, or influenced in some way. The ACLs are divided
into EtherTypes. IPv4, ARP protocol, MAC and VLAN parameters etc. Here we will just go over the standard and extended access
lists for TCP/IP. As you create ACEs for ingress classification, you can assign a policy for each port. The policy number is 1–8; however, each policy can be applied to any port. This makes it very easy to determine what type of ACL policy you will be working
with.
5.2.1 Ports
The section describes how to configure the ACL parameters (ACE) of each switch port. These parameters will affect frames
received on a port unless the frame matches a specific ACE.
Web Interface
To configure the ACL Ports Configuration in the web interface:
1. Click Configuration, ACL, then Ports.
2. Scroll to the specific parameter value to select the correct value for port ACL setting.
3. Click on Apply to save the setting.
4. If you want to cancel the setting, then you need to click the reset button. It will revert to previously saved values.
5. After you finish configuring settings, then you can see the port Counter. Click refresh to update the counter or Clear the
information.
Figure 5-7. The ACL Ports Configuration screen.
724-746-5500 | blackbox.com
Page 51
Page 52
Chapter 5: Configuration
Parameter description:
• Port: The logical port for the settings contained in the same row.
• Policy ID: Select the policy to apply to this port. The allowed values are 1 through 8. The default value is 1.
• Action: Select whether forwarding is permitted (“Permit”) or denied (“Deny”). The default value is “Permit.”
• Rate Limiter ID: Select which rate limiter to apply on this port. The allowed values are Disabled or the numbers 1 through 16.
The default value is “Disabled.”
• Port Copy: Select which port frames are copied on. The allowed values are Disabled or a specific port number. The default value
is “Disabled.”
• Mirror: Specify the mirror operation of this port. The allowed values are:
Enabled: Frames received on the port are mirrored.
Disabled: Frames received on the port are not mirrored.
The default value is ”Disabled.”
• Logging: Specify the logging operation of this port. The allowed values are:
Enabled: Frames received on the port are stored in the System Log.
Disabled: Frames received on the port are not logged.
The default value is “Disabled.”
NOTE: The System Log memory size and logging rate are limited.
• Shutdown: Specify the port shut down operation. The allowed values are:
Enabled: If a frame is received on the port, the port will be disabled.
Disabled: Port shut down is disabled.
The default value is “Disabled.”
• Counter : Counts the number of frames that match this ACE.
• Buttons:
Apply: Click to save changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
• Upper right icon (Refresh, clear): Click on these icons to refresh the ACL Port Configuration or clear them manually.
5.2.2 Rate Limiters
The section describes how to configure the switch’s ACL Rate Limiter parameters. The Rate Limiter Level from 1 to 16 allows users
to set rate limiter value and units in pps or kbps.
Web Interface
To configure ACL Rate Limiter in the web interface:
1. Click Configuration, ACL, then Rate Limiter.
2. Specify the Rate field and the range from 0 to 3276700.
3. Scroll the units in pps or kbps.
4. Click Apply to save the setting.
5. To cancel the setting, click the reset button. It will revert to previously saved values.
Page 52
724-746-5500 | blackbox.com
Page 53
Chapter 5: Configuration
Figure 5-8. The ACL Rate Limiter Configuration screen.
Parameter description:
• Rate Limiter ID: The rate limiter ID for the settings contained in the same row.
• Rate: The allowed values are: 0–3276700 in pps or 0, 100, 200, 300, ..., 1000000 in kbps.
• Unit: Specify the rate unit. The allowed values are:
pps: packets per second.
kbps: Kbits per second.
• Buttons:
Apply: Click to save changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
5.2.3 Access Control List
The section describes how to configure Access Control List rule. An Access Control List (ACL) is a sequential list of permit or deny
conditions that apply to IP addresses, MAC addresses, or other more specific criteria. This switch tests ingress packets against the
conditions in an ACL one by one. A packet will be accepted as soon as it matches a permit rule, or dropped as soon as it matches
a deny rule. If no rules match, the frame is accepted. Other actions can also be invoked when a matching packet is found,
including rate limiting, copying matching packets to another port or to the system log, or shutting down a port.
724-746-5500 | blackbox.com
Page 53
Page 54
Chapter 5: Configuration
This page shows the Access Control List (ACL), which is made up of the ACEs defined on this switch. Each row describes the ACE
that is defined. The maximum number of ACEs is 256 on each switch. Click on the lowest plus sign to add a new ACE to the list.
The reserved ACEs used for internal protocol, cannot be edited or deleted, the order sequence cannot be changed an the priority
is highest.
Web Interface
To configure Access Control List in the web interface:
1. Click Configuration, ACL, then Configuration.
2. Click the button to add a new ACL, or use the other ACL modification buttons to specify the editing action (i.e., edit, delete, or
moving the relative position of entry in the list).
3. To specific the parameter of the ACE.
4. Click on Apply to save the setting.
5. To cancel the setting, click the reset button. It will revert to previously saved values.
6. When editing an entry on the ACE Configuration page, note that the Items displayed depend on various selections, such as
Frame Type and IP Protocol Type. Specify the relevant criteria to be matched for this rule, and set the actions to take when a
rule is matched (such as Rate Limiter, Port Copy, Logging, and Shutdown).
Figure 5-9. The ACL Rate Limiter Configuration screens.
Parameter description:
• Ingress Port: Select the ingress port for which this ACE applies.
All: The ACE applies to all port.
Port n: The ACE applies to this port number, where n is the number of the switch port.
Page 54
724-746-5500 | blackbox.com
Page 55
Chapter 5: Configuration
• Policy Filter: Specify the policy number filter for this ACE.
Any: No policy filter is specified. (policy filter status is “don't-care.”)
Specific: If you want to filter a specific policy with this ACE, choose this value. Two fields for entering an policy value and bit
mask appears.
• Policy Value: When “Specific” is selected for the policy filter, you can enter a specific policy value. The allowed range is 0 to
255.
• Policy Bitmask: When "Specific" is selected for the policy filter, you can enter a specific policy bitmask. The allowed range is 0x0
to 0xff.
• Frame Type: Select the frame type for this ACE. These frame types are mutually exclusive.
Any: Any frame can match this ACE.
Ethernet Type: Only Ethernet Type frames can match this ACE. The IEEE 802.3 describes the value of Length/Type Field
specifications to be greater than or equal to 1536 decimal (equal to 0600 hexadecimal).
ARP: Only ARP frames can match this ACE. Notice the ARP frames won't match the ACE with Ethernet type.
IPv4: Only IPv4 frames can match this ACE. Notice the IPv4 frames won't match the ACE with Ethernet type.
IPv6: Only IPv6 frames can match this ACE. Notice the IPv6 frames won't match the ACE with Ethernet type.
• Action: Specify the action to take with a frame that hits this ACE.
Permit: The frame that hits this ACE is granted permission for the ACE operation.
Deny: The frame that hits this ACE is dropped.
• Rate Limiter: Specify the rate limiter in number of base units. The allowed range is 1 to 16. Disabled indicates that the rate
limiter operation is disabled.
• Port Redirect: Frames that hit the ACE are redirected to the port number specified here. The allowed range is the same as the
switch port number range. Disabled indicates that the port redirect operation is disabled.
• Logging: Specify the logging operation of the ACE. The allowed values are:
Enabled: Frames matching the ACE are stored in the System Log.
Disabled: Frames matching the ACE are not logged.
NOTE: System Log memory size and logging rate is limited.
• Shutdown: Specify the port shut down operation of the ACE. The allowed values are:
Enabled: If a frame matches the ACE, the ingress port will be disabled.
Disabled: Port shut down is disabled for the ACE.
• Counter: The counter indicates the number of times the ACE was hit by a frame.
MAC Parameters
• SMAC Filter: Only displayed when the frame type is Ethernet Type or ARP. Specify the source MAC filter for this ACE.
Any: No SMAC filter is specified. (SMAC filter status is “don't-care.”)
Specific: If you want to filter a specific source MAC address with this ACE, choose this value. A field for entering an SMAC value
appears.
• SMAC Value: When “Specific” is selected for the SMAC filter, you can enter a specific source MAC address. The legal format is
"xx-xx-xx-xx-xx-xx" or "xx.xx.xx.xx.xx.xx" or "xxxxxxxxxxxx" (x is a hexadecimal digit). A frame that hits this ACE matches this
SMAC value.
724-746-5500 | blackbox.com
Page 55
Page 56
Chapter 5: Configuration
• DMAC Filter: Specify the destination MAC filter for this ACE.
Any: No DMAC filter is specified. (DMAC filter status is “don't-care.”)
MC: Frame must be multicast.
BC: Frame must be broadcast.
UC: Frame must be unicast.
Specific: If you want to filter a specific destination MAC address with this ACE, choose this value. A field for entering a DMAC
value appears.
• DMAC Value: When “Specific” is selected for the DMAC filter, you can enter a specific destination MAC address. The legal format is "xx-xx-xx-xx-xx-xx" or "xx.xx.xx.xx.xx.xx" or "xxxxxxxxxxxx" (x is a hexadecimal digit). A frame that hits this ACE matches this DMAC value.
VLAN Parameters
• VLAN ID Filter: Specify the VLAN ID filter for this ACE.
Any: No VLAN ID filter is specified. (VLAN ID filter status is “don't-care.”)
Specific: If you want to filter a specific VLAN ID with this ACE, choose this value. A field for entering a VLAN ID number
appears.
• VLAN ID: When “Specific” is selected for the VLAN ID filter, you can enter a specific VLAN ID number. The allowed range is 1
to 4094. A frame that reaches this ACE matches this VLAN ID value.
• Tag Priority: Specify the tag priority for this ACE. A frame that hits this ACE matches this tag priority. The allowed number range
is 0 to 7. “Any” means that no tag priority is specified (tag priority is “don't-care.”)
ARP Parameters
The ARP parameters can be configured when Frame Type "ARP" is selected.
• ARP/RARP: Specify the available ARP/RARP opcode (OP) flag for this ACE.
Any: No ARP/RARP OP flag is specified. (OP is “don't-care.”)
ARP: Frame must have ARP/RARP opcode set to ARP.
RARP: Frame must have ARP/RARP opcode set to RARP.
Other: Frame has unknown ARP/RARP Opcode flag.
• Request/Reply: Specify the available ARP/RARP opcode (OP) flag for this ACE.
Any: No ARP/RARP OP flag is specified. (OP is “don't-care.”)
Request: Frame must have ARP Request or RARP Request OP flag set.
Reply: Frame must have ARP Reply or RARP Reply OP flag.
• Sender IP Filter: Specify the sender IP filter for this ACE.
Any: No sender IP filter is specified. (Sender IP filter is “don't-care.”)
Host: Sender IP filter is set to Host. Specify the sender IP address in the SIP Address field that appears.
Network: Sender IP filter is set to Network. Specify the sender IP address and sender IP mask in the SIP Address and SIP Mask
fields that appear.
• Sender IP Address: When “Host” or “Network” is selected for the sender IP filter, you can enter a specific sender IP address in
dotted decimal notation.
Page 56
724-746-5500 | blackbox.com
Page 57
Chapter 5: Configuration
• Sender IP Mask: When “Network” is selected for the sender IP filter, you can enter a specific sender IP mask in dotted decimal
notation.
• Target IP Filter: Specify the target IP filter for this specific ACE.
Any: No target IP filter is specified. (Target IP filter is "don't-care".)
Host: Target IP filter is set to Host. Specify the target IP address in the Target IP Address field that appears.Network: Target IP
filter is set to Network. Specify the target IP address and target IP mask in the Target IP Address and Target IP Mask fields that
ap pear.
• Target IP Address: When “Host” or “Network” is selected for the target IP filter, you can enter a specific target IP address in
dotted decimal notation.
• Target IP Mask: When “Network” is selected for the target IP filter, you can enter a specific target IP mask in dotted decimal
notation.
• ARP SMAC Match: Specify whether frames can hit the action according to their sender hardware address field (SHA) settings.
0: ARP frames where SHA is not equal to the SMAC address.
1: ARP frames where SHA is equal to the SMAC address.
Any: Any value is allowed (“don't-care.”)
• RARP DMAC Match: Specify whether frames can hit the action according to their target hardware address field (THA) settings.
0: RARP frames where THA is not equal to the DMAC address.
1: RARP frames where THA is equal to the DMAC address.
Any: Any value is allowed (“don't-care”).
• IP/Ethernet Length: Specify whether frames can hit the action according to their ARP/RARP hardware address length (HLN) and
protocol address length (PLN) settings.
0: ARP/RARP frames where the HLN is not equal to Ethernet (0x06) or the (PLN) is not equal to IPv4 (0x04).
1: ARP/RARP frames where the HLN is equal to Ethernet (0x06) and the (PLN) is equal to IPv4 (0x04).
Any: Any value is allowed ("don't-care").
• IP: Specify whether frames can hit the action according to their ARP/RARP hardware address space (HRD) settings.
0: ARP/RARP frames where the HLD is not equal to Ethernet (1).
1: ARP/RARP frames where the HLD is equal to Ethernet (1).
Any: Any value is allowed (“don't-care”).
• Ethernet: Specify whether frames can hit the action according to their ARP/RARP protocol address space (PRO) settings.
0: ARP/RARP frames where the PRO is not equal to IP (0x800).
1: ARP/RARP frames where the PRO is equal to IP (0x800).
Any: Any value is allowed (“don't-care”).
IP Parameters
The IP parameters can be configured when Frame Type "IPv4" is selected.
• IP Protocol Filter: Specify the IP protocol filter for this ACE.
Any: No IP protocol filter is specified (“don't-care”).
Specific: If you want to filter a specific IP protocol filter with this ACE, choose this value. A field for entering an IP protocol filter
appears.
724-746-5500 | blackbox.com
Page 57
Page 58
Chapter 5: Configuration
ICMP: Select ICMP to filter IPv4 ICMP protocol frames. Extra fields for defining ICMP parameters will appear. These fields are
explained later in this help file.
UDP: Select UDP to filter IPv4 UDP protocol frames. Extra fields for defining UDP parameters will appear. These fields are
explained later in this help file.
TCP: Select TCP to filter IPv4 TCP protocol frames. Extra fields for defining TCP parameters will appear. These fields are explained
later in this help file.
• IP Protocol Value: When “Specific” is selected for the IP protocol value, you can enter a specific value. The allowed range is 0
to255. A frame that hits this ACE matches this IP protocol value.
• IP TTL: Specify the Time-to-Live settings for this ACE.
zero: IPv4 frames with a Time-to-Live field greater than zero must not be able to match this entry.
non-zero: IPv4 frames with a Time-to-Live field greater than zero must be able to match this entry.
Any: Any value is allowed ("don't-care").
• IP Fragment: Specify the fragment offset settings for this ACE. This involves the settings for the More Fragments (MF) bit and
the Fragment Offset (FRAG OFFSET) field for an IPv4 frame.
No: IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must not be able to match this entry.
Yes: IPv4 frames where the MF bit is set or the FRAG OFFSET field is greater than zero must be able to match this entry.
Any: Any value is allowed (“don't-care”).
• IP Option: Specify the options flag setting for this ACE.
No: IPv4 frames where the options flag is set must not be able to match this entry.
Yes: IPv4 frames where the options flag is set must be able to match this entry.
Any: Any value is allowed (“don't-care”).
• SIP Filter: Specify the source IP filter for this ACE.
Any: No source IP filter is specified. (Source IP filter is “don't-care”).
Host: Source IP filter is set to Host. Specify the source IP address in the SIP Address field that appears.
Network: Source IP filter is set to Network. Specify the source IP address and source IP mask in the SIP Address and SIP Mask
fields that appear.
• SIP Address: When “Host” or “Network” is selected for the source IP filter, you can enter a specific SIP address in dotted
decimal notation.
• SIP Mask: When “Network” is selected for the source IP filter, you can enter a specific SIP mask in dotted decimal notation.
• DIP Filter: Specify the destination IP filter for this ACE.
Any: No destination IP filter is specified. (Destination IP filter is “don't-care.”)
Host: Destination IP filter is set to Host. Specify the destination IP address in the DIP Address field that appears.
Network: Destination IP filter is set to Network. Specify the destination IP address and destination IP mask in the DIP Address
and DIP Mask fields that appear.
• DIP Address: When “Host” or “Network” is selected for the destination IP filter, you can enter a specific DIP address in dotted
decimal notation.
• DIP Mask: When “Network” is selected for the destination IP filter, you can enter a specific DIP mask in dotted decimal
notation.
Page 58
724-746-5500 | blackbox.com
Page 59
Chapter 5: Configuration
ICMP Parameters
• ICMP Type Filter: Specify the ICMP filter for this ACE.
Any: No ICMP filter is specified (ICMP filter status is “don't-care”).
Specific: If you want to filter a specific ICMP filter with this ACE, you can enter a specific ICMP value. A field for entering an
ICMP value appears.
• ICMP Type Value: When “Specific” is selected for the ICMP filter, you can enter a specific ICMP value. The allowed range is 0 to
255. A frame that hits this ACE matches this ICMP value.
• ICMP Code Filter: Specify the ICMP code filter for this ACE.
Any: No ICMP code filter is specified (ICMP code filter status is “don't-care”).
Specific: If you want to filter a specific ICMP code filter with this ACE, you can enter a specific ICMP code value. A field for
entering an ICMP code value appears.
• ICMP Code Value: When “Specific” is selected for the ICMP code filter, you can enter a specific ICMP code value. The allowed
range is 0 to 255. A frame that hits this ACE matches this ICMP code value.
TCP/UDP Parameters
• TCP/UDP Source Filter: Specify the TCP/UDP source filter for this ACE.
Any: No TCP/UDP source filter is specified (TCP/UDP source filter status is “don't-care”).
Specific: If you want to filter a specific TCP/UDP source filter with this ACE, you can enter a specific TCP/UDP source value. A
field for entering a TCP/UDP source value appears.
Range: If you want to filter a specific TCP/UDP source range filter with this ACE, you can enter a specific TCP/UDP source range
value. A field for entering a TCP/UDP source value appears.
• TCP/UDP Source No.: When “Specific” is selected for the TCP/UDP source filter, you can enter a specific TCP/UDP source value.
The allowed range is 0 to 65535. A frame that hits this ACE matches this TCP/UDP source value.
• TCP/UDP Source Range: When “Range” is selected for the TCP/UDP source filter, you can enter a specific TCP/UDP source range
value. The allowed range is 0 to 65535. A frame that hits this ACE matches this TCP/UDP source value.
• TCP/UDP Destination Filter: Specify the TCP/UDP destination filter for this ACE.
Any: No TCP/UDP destination filter is specified (TCP/UDP destination filter status is “don't-care”).
Specific: If you want to filter a specific TCP/UDP destination filter with this ACE, you can enter a specific TCP/UDP destination
value. A field for entering a TCP/UDP destination value appears.
Range: If you want to filter a specific range TCP/UDP destination filter with this ACE, you can enter a specific TCP/UDP destina-
tion range value. A field for entering a TCP/UDP destination value appears.
• TCP/UDP Destination Number: When “Specific” is selected for the TCP/UDP destination filter, you can enter a specific TCP/UDP
destination value. The allowed range is 0 to 65535. A frame that hits this ACE matches this TCP/UDP destination value.
• TCP/UDP Destination Range: When “Range” is selected for the TCP/UDP destination filter, you can enter a specific TCP/UDP
destination range value. The allowed range is 0 to 65535. A frame that hits this ACE matches this TCP/UDP destination value.
• TCP FIN: Specify the TCP "No more data from sender" (FIN) value for this ACE.
0: TCP frames where the FIN field is set must not be able to match this entry.
1: TCP frames where the FIN field is set must be able to match this entry.
Any: Any value is allowed (“don't-care”).
724-746-5500 | blackbox.com
Page 59
Page 60
Chapter 5: Configuration
• TCP SYN: Specify the TCP "Synchronize sequence numbers" (SYN) value for this ACE.
0: TCP frames where the SYN field is set must not be able to match this entry.
1: TCP frames where the SYN field is set must be able to match this entry.
Any: Any value is allowed (“don't-care”).
• TCP RST: Specify the TCP “Reset the connection” (RST) value for this ACE.
0: TCP frames where the RST field is set must not be able to match this entry.
1: TCP frames where the RST field is set must be able to match this entry.
Any: Any value is allowed (“don't-care”).
• TCP PSH: Specify the TCP “Push Function” (PSH) value for this ACE.
0: TCP frames where the PSH field is set must not be able to match this entry.
1: TCP frames where the PSH field is set must be able to match this entry.
Any: Any value is allowed (“don't-care”).
• TCP ACK: Specify the TCP “Acknowledgment field significant” (ACK) value for this ACE.
0: TCP frames where the ACK field is set must not be able to match this entry.
1: TCP frames where the ACK field is set must be able to match this entry.
Any: Any value is allowed (“don't-care”).
• TCP URG: Specify the TCP "Urgent Pointer field significant" (URG) value for this ACE.
0: TCP frames where the URG field is set must not be able to match this entry.
1: TCP frames where the URG field is set must be able to match this entry.
Any: Any value is allowed (“don't-care”).
Ethernet Type Parameters
The Ethernet Type parameters can be configured when Frame Type “Ethernet Type” is selected.
• EtherType Filter: Specify the Ethernet type filter for this ACE.
Any: No EtherType filter is specified (EtherType filter status is “don't-care”).
Specific: If you want to filter a specific EtherType filter with this ACE, you can enter a specific EtherType value. A field for enter-
ing a EtherType value appears.
• Ethernet Type Value: When “Specific” is selected for the EtherType filter, you can enter a specific EtherType value. The allowed
range is 0x600 to 0xFFFF, but excludes 0x800(IPv4), 0x806(ARP) and 0x86DD(IPv6). A frame that hits this ACE matches this
EtherType value.
5.2.4 ACL Status
The section describes how to show the ACL status by different ACL users. Each row describes the ACE that is defined. It is a conflict if a specific ACE is not applied to the hardware due to hardware limitations. The maximum number of ACEs is 256 on each
switch.
Web Interface
To display the ACL status in the web interface:
1. Click Configuration, ACL, then ACL status.
2. If you want to auto-refresh the information then you need to select “Auto-refresh.”
• Ingress Port : Indicates the ingress port of the ACE. Possible values are:
Any: The ACE will match any ingress port.
Policy: The ACE will match ingress ports with a specific policy.
Port: The ACE will match a specific ingress port.
• Frame Type: Indicates the frame type of the ACE. Possible values are:
Any: The ACE will match any frame type.
EType: The ACE will match Ethernet Type frames.
NOTE: An Ethernet Type based ACE will not get matched by IP and ARP frames.
ARP: The ACE will match ARP/RARP frames.
IPv4: The ACE will match all IPv4 frames.
IPv4/ICMP: The ACE will match IPv4 frames with ICMP protocol.
IPv4/UDP: The ACE will match IPv4 frames with UDP protocol.
IPv4/TCP: The ACE will match IPv4 frames with TCP protocol.
IPv4/Other: The ACE will match IPv4 frame that are not ICMP/UDP/TCP.
IPv6: The ACE will match all IPv6 standard frames.
• Action: Indicates the forwarding action of the ACE.
Permit: Frames matching the ACE may be forwarded and learned.
Deny: Frames matching the ACE are dropped.
• Port Redirect: Indicates the rate limiter number of the ACE. The allowed range is 1 to 16.
When Disabled is displayed, the rate limiter operation is disabled.
724-746-5500 | blackbox.com
Page 61
Page 62
Chapter 5: Configuration
• CPU: Forward packet that matched the specific ACE to CPU.
• CPU Once: Forward first packet that matched the specific ACE to CPU.
• Counter: The counter indicates the number of times the ACE was hit by a frame.
• Conflict: Indicates the hardware status of the specific ACE. The specific ACE is not applied to the hardware due to hardware
limitations.
• Auto-refresh: Select auto-refresh to refresh the information automatically.
• Upper right icon (Refresh): Click on this icon to refresh the ACL status information manually.
5.3 Aggregation
Aggregation is used to configure the settings of Link Aggregation. You can bundle more than one port with the same speed, full
duplex, and the same MAC to be a single logical port, thus the logical port aggregates the bandwidth of these ports. This means
you can apply your current Ethernet equipment’s settings to build the bandwidth aggregation. For example, if there are three Fast
Ethernet ports aggregated in a logical port, then this logical port has bandwidth three times as high as a single Fast Ethernet port
has.
5.3.1 Static Trunk
The Aggregation Configuration is used to configure the settings of Link Aggregation. You can bundle more than one port with
the same speed, full duplex and the same MAC to be a single logical port, thus the logical port aggregates the bandwidth of
these ports. This means you can apply your current Ethernet equipment’s to build the bandwidth aggregation.
Static Trunk
Ports using Static Trunk as their trunk method can choose their unique Static GroupID to form a logical trunked port.” The benefit
of using the Static Trunk method is that a port can immediately become a member of a trunk group without any handshaking
with its peer port. This is also a disadvantage because the peer ports of your static trunk group may not know that they should
be aggregated together to form a “logical trunked port.” Using Static Trunk on both ends of a link is strongly recommended.
NOTE: Low speed links will stay in a “not ready” state when using static trunk to aggregate with high speed links.
Web Interface
To configure the Trunk Aggregation Hash mode and Aggregation Group in the web interface:
1. Click Configuration, Static Trunk, and then Aggregation Mode Configuration.
2. Evoke to enable or disable the aggregation mode function. Select Aggregation Group ID and Port members.
3. Click the apply to save the setting.
4. If you want to cancel the setting then you need to click the reset button. It will revert to previously saved values.
• Source MAC Address: The Source MAC address can be used to calculate the destination port for the frame. Check to enable
the use of the Source MAC address, or uncheck to disable. By default, Source MAC Address is enabled.
• Destination MAC Address: The Destination MAC Address can be used to calculate the destination port for the frame. Check to
enable the use of the Destination MAC Address, or uncheck to disable. By default, Destination MAC Address is disabled.
• IP Address: The IP address can be used to calculate the destination port for the frame. Check to enable the use of the IP
Address, or uncheck to disable. By default, IP Address is enabled.
• TCP/UDP Port Number: The TCP/UDP port number can be used to calculate the destination port for the frame. Check to enable
the use of the TCP/UDP Port Number, or uncheck to disable. By default, TCP/UDP Port Number is enabled.
Aggregation Group Configuration
• Group ID: Indicates the group ID for the settings contained in the same row. Group ID “Normal” indicates there is no
aggregation. Only one group ID is valid per port.
• Port Members: Each switch port is listed for each group ID. Select a radio button to include a port in an aggregation, or clear
the radio button to remove the port from the aggregation. By default, no ports belong to any aggregation group. Only full
duplex ports can join an aggregation and ports must have the same speed in each group.
• Buttons:
Apply: Click to apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
724-746-5500 | blackbox.com
Page 63
Page 64
Chapter 5: Configuration
5.3.2 LACP
Ports using Link Aggregation Control Protocol (according to IEEE 802.3ad specification) as their trunking method can choose their
unique LACP GroupID to form a logic “trunked port.” The benefit of using LACP is that a port makes an agreement with its peer
port before it becomes a ready member of a “trunk group” (also called aggregator). LACP is safer than the other trunking
method—static trunk.
Configuration
This page allows the user to inspect the current LACP port configurations, and possibly change them as well An LACP trunk
group with more than one ready member-ports is a “real trunked” group. An LACP trunk group with only one or less than one
ready member-ports is not a “real trunked” group.
Web Interface
To configure the Trunk Aggregation LACP parameters in the web interface:
1. Click Configuration, LACP, Configuration.
2. Evoke to enable or disable the LACP on the port of the switch. Scroll the Key parameter with Auto or Specific Default is Auto.
3. Scroll the Role with Active or Passive. Default is Active.
4. Click Apply to save the setting.
5. If you want to cancel the setting then you need to click the reset button. It will revert to previously saved values.
Page 64
Figure 5-12. The LACP Port Configuration.
724-746-5500 | blackbox.com
Page 65
Chapter 5: Configuration
Parameter description:
• Port: The switch port number.
• LACP Enabled: Controls whether LACP is enabled on this switch port. LACP will form an aggregation when 2 or more ports are
connected to the same partner. LACP can form max 12 LLAGs per switch and 2 GLAGs.
• Key: The Key value incurred by the port, range 1–65535. The Auto setting will set the key as appropriate by the physical link
speed, 10 Mb = 1, 100 Mb = 2, 1 Gb = 3. Using the Specific setting, a user-defined value can be entered. Ports with the same
Key value can participate in the same aggregation group, while ports with different keys cannot.
• Role: The Role shows the LACP activity status. The Active will transmit LACP packets each second, while Passive will wait for a
LACP packet from a partner (speak if spoken to).
• Buttons:
Apply: Click to apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
System Status
This section describes that when you complete to set LACP function on the switch then it provides a status overview for all LACP
instances.
Web Interface:
To display the LACP System status in the web interface:
1. Click Configuration, LACP, System Status.
2. If you want to auto-refresh the information then you need to select “Auto-refresh.”
3. Click “Refresh” to refresh the LACP System Status.
Figure 5-13. The LACP System Status.
Parameter description:
• Aggr ID: The Aggregation ID associated with this aggregation instance. For LLAG the id is shown as “isid:aggr-id” and for
GLAGs as “aggr-id”.
• Partner System ID: The system ID (MAC address) of the aggregation partner.
• Partner Key: The Key that the partner has assigned to this aggregation ID.
• Last changed: The time since this aggregation changed.
• Local Ports: Shows which ports are a part of this aggregation for this switch. The format is: “Switch ID:Port.”
• Auto-refresh: To evoke the auto-refresh to refresh the information automatically.
• Upper right icon (Refresh): Click on this icon to refresh the LACP System status information manually.
724-746-5500 | blackbox.com
Page 65
Page 66
Chapter 5: Configuration
Port Status
This section describes that when you complete to set LACP function on the switch then it provides a Port Status overview for all
LACP instances.
Web Interface
To display the LACP Port status in the web interface:
1. Click Configuration, LACP, Port Status.
2. If you want to auto-refresh the information then you need to select “Auto-refresh.”
3. Click “Refresh” to refresh the LACP Port Status.
Page 66
Figure 5-14. The LACP Status screen.
724-746-5500 | blackbox.com
Page 67
Chapter 5: Configuration
Parameter description:
• Port: The switch port number.
• LACP: “Yes” means that LACP is enabled and the port link is ”No“ means that LACP is not enabled or that the port link is
down. “Backup” means that the port could not join the aggregation group but will join if other port leaves. Meanwhile its
LACP status is disabled.
• Key: The key assigned to this port. Only ports with the same key can aggregate together.
• Aggr ID: The Aggregation ID assigned to this aggregation group. IDs 1 and 2 are GLAGs while IDs 3–14 are LLAGs.
• Partner System ID: The partner’s System ID (MAC address).
• Partner Port: The partner‘s port number connected to this port.
• Auto-refresh: Select auto-refresh to refresh the information automatically.
• Upper right icon (Refresh): Click on this icon to refresh the LACP port status information manually.
Port Statistics
When you set LACP function on the switch then it provides a Port Statistics overview for all LACP instances.
Web Interface
To display the LACP Port status in the web interface:
1. Click Configuration, LACP, Port Statistics.
2. If you want to auto-refresh the information then you need to select “Auto refresh.”
3. Click “Refresh” to refresh the LACP Statistics.
724-746-5500 | blackbox.com
Page 67
Page 68
Chapter 5: Configuration
Parameter description:
• Port: The switch port number.
• LACP Received: Shows how many LACP frames have been received at each port.
• LACP Transmitted: Shows how many LACP frames have been sent from each port.
• Discarded: Shows how many unknown or illegal LACP frames have been discarded at each port.
• Auto-refresh: Select auto-refresh to refresh the information automatically.
• Upper right icon (Refresh, Clear). Click on these icons to refresh the LACP port statistics information or clear them manually.
5.4 Spanning Tree
The Spanning Tree Protocol (STP) can be used to detect and disable network loops, and to provide backup links between
switches, bridges, or routers. This allows the switch to interact with other bridging devices (that is, an STP-compliant switch,
bridge, or router) in your network to ensure that only one route exists between any two stations on the network, and provide
backup links that automatically take over when a primary link goes down.
Page 68
Figure 5-15. The LACP Statistics screen.
724-746-5500 | blackbox.com
Page 69
Chapter 5: Configuration
STP - STP uses a distributed algorithm to select a bridging device (STP- compliant switch, bridge, or router) that serves as the root
of the spanning tree network. It selects a root port on each bridging device (except for the root device) which incurs the lowest
path cost when
forwarding a packet from that device to the root device. Then it selects a designated bridging device from each LAN which incurs
the lowest path cost when forwarding a packet from that LAN to the root device. All ports connected to designated bridging
devices are assigned as designated ports. After determining the lowest cost spanning tree, it enables all root ports and designated
ports, and disables all other ports. Network packets are therefore only forwarded between root ports and designated ports, eliminating any possible network loops.
Figure 5-16. Spanning Tree example.
Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge Protocol Data Units) transmitted
from the Root Bridge. If a bridge does not get a Hello BPDU after a predefined interval (Maximum Age), the bridge assumes that
the link to the Root Bridge is down. This bridge will then initiate negotiations with other bridges to reconfigure the network to
reestablish a valid network topology.
5.4.1 Bridge Settings
The section describes that how to configure the Spanning Tree Bridge and STP System settings. It allows you to configure STP
System settings that are used by all STP Bridge instances.
Web Interface
To configure the Spanning Tree Bridge Settings parameters in the web interface:
2. Scoll to select the parameters and write down available value of parameters in blank field in Basic Settings.
3. Enable or disable the parameters in a blank field in Advanced settings.
4. Click Apply to save the setting.
5. To cancel the setting, click the Reset button. It will revert to previously saved values.
724-746-5500 | blackbox.com
Page 69
Page 70
Chapter 5: Configuration
Figure 5-17. STP Bridge Configuration screen.
Parameter description:
Basic Settings
• Protocol Version: The STP protocol version setting. Valid values are STP, RSTP, and MSTP.
• Bridge Priority: Controls the bridge priority. Lower numeric values have higher priority. The bridge priority plus the MSTI instance
number, concatenated with the 6-byte MAC address of the switch, forms a Bridge Identifier. For MSTP operation, this is the
priority of the CIST. Otherwise, this is the priority of the STP/RSTP bridge.
• Forward Delay: The delay used by STP Bridges to transmit Root and Designated Ports to Forwarding (used in STP compatible
mode). Valid values are in the range 4 to 30 seconds.
• Max Age: The maximum age of the information transmitted by the Bridge when it is the Root Bridge. Valid values are in the
range 6 to 40 seconds, and MaxAge must be <= (FwdDelay-1)*2.
• Maximum Hop Count: This defines the initial value of remaining Hops for MSTI information generated at the boundary of an
MSTI region. It defines how many bridges a root bridge can distribute its BPDU information to. Valid values are in the range 6 to
40 hops.
• Transmit Hold Count: The number of BPDUs a bridge port can send per second. When exceeded, transmission of the next BPDU
will be delayed. Valid values are in the range 1 to 10 BPDUs per second.
Advanced Settings
• Edge Port BPDU Filtering: Control whether a port explicitly configured as Edge will transmit and receive BPDUs.
• Edge Port BPDU Guard: Control whether a port explicitly configured as Edge will disable itself upon reception of a BPDU. The
port will enter the error-disabled state, and will be removed from the active topology.
• Port Error Recovery: Control whether a port in the error-disabled state automatically will be enabled after a certain time. If
recovery is not enabled, ports have to be disabled and re-enabled for normal STP operation. The condition is also cleared by a
system reboot.
Page 70
724-746-5500 | blackbox.com
Page 71
Chapter 5: Configuration
• Port Error Recovery Timeout: The time to pass before a port in the error-disabled state can be enabled. Valid values are between
30 and 86400 seconds (24 hours).
• Buttons:
Apply: Click to apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
5.4.2 MSTI Mapping
You can implement a Spanning Tree protocol on the switch. The CIST is not available for explicit mapping, because it will receive
the VLANs not explicitly mapped. You must set VLANs mapped to the MSTI. The VLANs must be separated with a comma and/or
space. A VLAN can only be mapped to one MSTI. An unused MSTI should just be left empty. (I.e. not having any VLANs mapped
to it.)
Users can inspect the current STP MSTI bridge instance priority configurations, and possibly change them as well.
Web Interface
To configure the Spanning Tree MSTI Mapping parameters in the web interface:
2. Specify the configuration identification parameters in the field. Specify the VLANs Mapped blank field.
3. Click Apply to save the setting.
4. To cancel the setting, click the Reset button. It will revert to previously saved values.
Figure 5-18. MSTI Configuration screen.
724-746-5500 | blackbox.com
Page 71
Page 72
Chapter 5: Configuration
Parameter description:
Configuration Identification
• Configuration Name: The name identifying the VLAN to MSTI mapping. Bridges must share the name and revision (see below),
as well as the VLAN-to-MSTI mapping configuration in order to share spanning trees for MSTIs (Intra-region). The name length
can be up to 32 characters.
• Configuration Revision: The revision of the MSTI configuration named above. This must be an integer between 0 and 65535.
MSTI Mapping
• MSTI: The bridge instance. The CIST is not available for explicit mapping, as it will receive the VLANs not explicitly mapped.
• VLANs Mapped: The list of VLANs mapped to the MSTI. The VLANs must be separated with comma and/or space. A VLAN can
only be mapped to one MSTI. An unused MSTI should just be left empty (I.e. not have any VLANs).
• Buttons:
Apply: Click to apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
5.4.3 MSTI Priorities
When you implement a Spanning Tree protocol on a switch, the CIST is the default bridge instance that is always active. To control the bridge priority, lower numeric values have higher priority. The bridge priority plus the MSTI instance number, concatenated
with the 6-byte MAC address of the switch forms a Bridge Identifier.
This section describes how the user can inspect the current STP MSTI bridge instance priority configurations, and possibly change
them as well.
Web Interface
To configure the Spanning Tree MSTI Priorities parameters in the web interface:
2. Scroll the Priority. Maximum is 240. Default is 128.
3. Click on Apply to save the setting.
4. To cancel the setting, click the Reset button. It will revert to previously saved values.
Page 72
724-746-5500 | blackbox.com
Page 73
Chapter 5: Configuration
Figure 5-19. MSTI Configuration screen.
Parameter description:
• MSTI: The bridge instance. The CIST is the default instance, which is always active.
• Priority: Controls the bridge priority. Lower numeric values have better priority. The bridge priority plus the MSTI instance
number, concatenated with the 6-byte MAC address of the switch forms a Bridge Identifier.
• Buttons:
Apply: Click to apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
5.4.4 CIST Ports
When you implement an Spanning Tree protocol on the switch, you need to configure the CIST Ports. The section describes how
to inspect the current STP CIST port configurations, and possibly change them as well.
Web Interface
To configure the Spanning Tree CIST Ports parameters in the web interface:
2. Scroll to set all parameters of CIST Aggregated Port Configuration.
3. Select to enable or disable the STP, then scroll and select to set all parameters of the CIST normal Port configuration.
4. Click on Apply to save the setting.
5. To cancel the setting, click the Reset button. It will revert to previously saved values.
724-746-5500 | blackbox.com
Page 73
Page 74
Chapter 5: Configuration
Parameter description:
• Port: The switch port number of the logical STP port.
• STP Enabled: Controls whether STP is enabled on this switch port.
• Path Cost: Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link
speed, using the 802.1D recommended values. Using the Specific setting, a user-defined value can be entered. The path cost is
used when establishing the active topology of the network. Lower path cost ports are chosen as forwarding ports in favor of
higher path cost ports. Valid values are in the range 1 to 200000000.
• Priority: Controls the port priority. This can be used to control priority of ports having identical port cost. (See above).
Page 74
Figure 5-20. STP CIST Port Configuration screen.
724-746-5500 | blackbox.com
Page 75
Chapter 5: Configuration
• operEdge (state flag): Operational flag describing whether the port is connecting directly to edge devices. (No Bridges
attached). Transition to the forwarding state is faster for edge ports (having operEdge true) than for other ports.The value of
this flag is based on AdminEdge and AutoEdge fields. This flag is displayed as Edge in Monitor->Spanning Tree -> STP Detailed
Bridge Status.
• AdminEdge: Controls whether the operEdge flag should start as set or cleared. (The initial operEdge state when a port is
initialized).
• AutoEdge: Controls whether the bridge should enable automatic edge detection on the bridge port. This allows operEdge to be
derived from whether BPDUs are received on the port or not.
• Restricted Role: If enabled, this causes the port not to be selected as Root Port for the CIST or any MSTI, even if it has the best
spanning tree priority vector. Such a port will be selected as an Alternate Port after the Root Port has been selected. If set, it can
cause lack of spanning tree connectivity. It can be set by a network administrator to prevent bridges external to a core region of
the network from influencing the spanning tree active topology, possibly because those bridges are not under the full control of
the administrator. This feature is also known as Root Guard.
• Restricted TCN: If enabled, this causes the port not to propagate received topology change notifications and topology changes
to other ports. If set, it can cause temporary loss of connectivity after changes in a spanning tree's active topology as a result of
persistently incorrect learned station location information. It is set by a network administrator to prevent bridges external to a
core region of the network from bridging, causing address flushing in that region, possibly because those bridges are not under
the full control of the administrator or the physical link state of the attached LANs transmits frequently.
• BPDU Guard: If enabled, causes the port to disable itself upon receiving valid BPDUs. Contrary to the similar bridge setting, the
port Edge status does not affect this setting. A port entering error-disabled state due to this setting is subject to the bridge Port
Error Recovery setting as well.
• Point to Point: Controls whether the port connects to a point-to-point LAN rather than to a shared medium. This can be
automatically determined, or forced either true or false. Transition to the forwarding state is faster for point-to-point LANs than
for shared media.
• Buttons:
Apply: Click to apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
5.4.5 MSTI Ports
The section describes how to inspect the current STP MSTI port configurations, and possibly change them as well.
An MSTI port is a virtual port that is initiated separately for each active CIST (physical) port for each MSTI instance configured on
and applicable to the port. The MSTI instance must be selected before displaying actual MSTI port configuration options. It contains MSTI port settings for physical and aggregated ports.
Web Interface
To configure the Spanning Tree MSTI Port Configuration parameters in the web interface:
3. Click Get to set the detail parameters of the MSTI Ports.
4. Scroll to set all parameters of the MSTI Port configuration.
5. Click Apply to save the setting.
6. To cancel the setting, click the Reset button. It will revert to previously saved values.
724-746-5500 | blackbox.com
Page 75
Page 76
Chapter 5: Configuration
Parameter description:
• Port: The switch port number of the corresponding STP CIST (and MSTI) port.
• Path Cost: Controls the path cost incurred by the port. The Auto setting will set the path cost as appropriate by the physical link
speed, using the 802.1D recommended values. Using the Specific setting, a user-defined value can be entered. The path cost is
used when establishing the active topology of the network. Lower path cost ports are chosen as forwarding ports in favor of
higher path cost ports. Valid values are in the range 1 to 200000000.
• Priority: Controls the port priority. This can be used to control priority of ports that have identical port cost. (See above).
• Buttons:
Apply: Click to apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
Page 76
Figure 5-21. MSTI Port Configuration screen.
724-746-5500 | blackbox.com
Page 77
Chapter 5: Configuration
5.4.6 Bridge Status
After you complete the MSTI Port configuration, the switch can display the Bridge Status. This section provides a status overview
of all STP bridge instances. The displayed table contains a row for each STP bridge instance, and the column displays the following
information:
Web Interface
To display the STP Bridges status in the web interface:
2. If you want to auto-refresh the information then you need to evoke the “Auto-refresh.”
3. Click “Refres”“ to refresh the STP Bridges.
Figure 5-22. STP Bridges status screen.
Parameter description:
• MSTI: The Bridge Instance. This is also a link to the STP Detailed Bridge Status.
• Bridge ID: The Bridge ID of this Bridge instance.
• Root ID: The Bridge ID of the currently selected root bridge.
• Root Port: The switch port currently assigned to the root port role.
• Root Cost: Root Path Cost. For the Root Bridge it is zero. For all other Bridges, it is the sum of the Port Path Costs on the least
cost path to the Root Bridge.
• Topology Flag: The current state of the Topology Change Flag of this Bridge instance.
• Topology Change Last: The time since last Topology Change occurred.
• Auto-refresh: Select auto-refresh to refresh the information automatically.
• Upper right icon (Refresh): Click on this icon to refresh the STP Bridges status information manually.
5.4.7 Port Status
After you complete the STP configuration, the switch can display the STP Port Status. This section explains how to display the STP
CIST port status for physical ports of the currently selected switch.
Web Interface
To display the STP Port status in the web interface:
1. Click Configuration, Spanning Tree, STP Port Status.
2. To auto-refresh the information, select “Auto-refresh.”
3. Click “Refresh” to refresh the STP Bridges manually.
724-746-5500 | blackbox.com
Page 77
Page 78
Chapter 5: Configuration
Figure 5-23. The STP Port status.
Parameter description:
• Port: The switch port number of the logical STP port.
• CIST Role: The current STP port role of the CIST port. The port role can be one of the following values: AlternatePort, Backup
Port, RootPort, DesignatedPort, Disabled.
• CIST State: The current STP port state of the CIST port. The port state can be one of the following values: Blocking, Learning,
Forwarding.
• Uptime: The time since the bridge port was last initialized.
• Auto-refresh: Select auto-refresh to refresh the information automatically.
• Upper right icon (Refresh): Click on these icons to refresh the STP Port status information manually.
5.4.8 Port Statistics
After you complete the STP configuration, the switch can display the STP Statistics. This section explains how to display the STP
Statistics detail counters of bridge ports in the currently selected switch.
Web Interface
To display the STP Port status in the web interface:
1. Click Configuration, Spanning Tree, Port Statistics.
2. To auto-refresh the information, select “Auto-refresh.”
3. Click “Refresh“ to refresh the STP Bridges manually.
Page 78
724-746-5500 | blackbox.com
Page 79
Chapter 5: Configuration
Figure 5-24. STP Statistics screen.
Parameter description:
• Port: The switch port number of the logical STP port.
• MSTP: The number of MSTP Configuration BPDUs received/transmitted on the port.
• RSTP: The number of RSTP Configuration BPDUs received/transmitted on the port.
• STP: The number of legacy STP Configuration BPDUs received/transmitted on the port.
• TCN: The number of (legacy) Topology Change Notification BPDUs received/transmitted on the port.
• Discarded Unknown: The number of unknown Spanning Tree BPDUs received (and discarded) on the port.
• Discarded Illegal: The number of illegal Spanning Tree BPDUs received (and discarded) on the port.
• Auto-refresh: Select auto-refresh to refresh the information automatically.
• Upper right icon (Refresh, Clear): Click on these icons to refresh the STP Statistics information or clear them manually.
5.5 IGMP Snooping
The function is used to establish the multicast groups to forward the multicast packet to the member ports. It avoids wasting the
bandwidth while IP multicast packets are running over the network. A switch that does not support IGMP or IGMP Snooping can
not tell the multicast packet from the broadcast packet, so it can only treat them all as broadcast packets. Without IGMP
Snooping, the multicast packet forwarding function forwards the broadcast packets.
The switch supports IGMP Snooping. This includes query, report, and leave, which is a type of packet exchanged between an IP
Multicast Router/Switch and an IP Multicast Host. The switch can update the Multicast table when a member (port) joins or
leaves an IP Multicast Destination Address. With this function, once a switch receives an IP multicast packet, it will forward the
packet to the members who previously joined in a specified IP multicast group.
The packets will be discarded by IGMP Snooping if the user transmits multicast packets to the multicast group that had not been
built in advance. IGMP mode enables the switch to issue an IGMP function to enable IGMP proxy or snooping on the switch,
which connects to a router closer to the root of the tree. This interface is the upstream interface. The router on the upstream
interface should be running IGMP.
5.5.1 Basic Configuration
The section describes how to set the basic IGMP snooping on the switch, which connects to a router closer to the root of the
tree. This interface is the upstream interface. The router on the upstream interface should be running IGMP.
Web Interface
To configure the IGMP Snooping parameters in the web interface:
• IGMP SSM Range: SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers to run the SSM service model
for the groups in the address range. Format: (IP address/sub mask)
• Proxy Enabled: Enable IGMP Proxy. This feature can be used to avoid forwarding unnecessary join and leave messages to the
router side.
• Port: This shows the physical Port index of switch.
• Router Port: Specify which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer
3 multicast device or IGMP querier.
If an aggregation member port is selected as a router port, the whole aggregation will act as a router port.
• Fast Leave: Enable the fast leave on the port.
• Throttling: Enable to limit the number of multicast groups to which a switch port can belong.
• Buttons:
Apply: Click to apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
5.5.2 VLAN Configuration
The section describes the VLAN configuration setting process integrated with the IGMP Snooping function. Each setting page
shows up to 99 entries from the VLAN table (the default is 20) selected through the “entries per page” input field. When first
visited, the web page will show the first 20 entries from the beginning of the VLAN Table. The first entry displayed will be the one
with the lowest VLAN ID found in the VLAN Table. The “VLAN” input fields allow the user to select the starting point in the
VLAN Table. Clicking the button will update the displayed table starting from that or the next closest VLAN Table match.
Web Interface
To configure the IGMP Snooping VLAN Configuration in the web interface:
• VLAN ID: This displays the VLAN ID of the entry.
• Snooping Enabled: Enable the per-VLAN IGMP Snooping. Up to 32 VLANs can be selected.
• IGMP Querier: A router sends IGMP Query messages to a particular link. This Router is called the Querier. Enable the IGMP
Querier in the VLAN.
• Compatibility: Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of IGMP
operating on hosts and routers within a network. The allowed selection is IGMP-Auto, Forced IGMPv1, Forced IGMPv2, Forced
IGMPv3, and the default compatibility value is IGMP-Auto.
• Rv: Robustness Variable. The Robustness Variable allows tuning for the expected packet loss on a network. The allowed range is
1 to 255; the default robustness variable value is 2.
• QI: Query Interval. The Query Interval is the interval between General Queries sent by the Querier. The allowed range is 1 to
31744 seconds; the default query interval is 125 seconds.
• QRI: Query Response Interval. The Max Response Time is used to calculate the Max Resp Code inserted into the periodic
General Queries. The allowed range is 0 to 31744 in tenths of seconds; the default query response interval is 100 in tenths of
seconds (10 seconds).
• LLQI (LMQI for IGMP): Last Member Query Interval. The Last Member Query Time is the time value represented by the Last
Member Query Interval, multiplied by the Last Member Query Count. The allowed range is 0 to 31744 in tenths of seconds; the
default last member query interval is 10 in tenths of seconds (1 second).
• URI: Unsolicited Report Interval. The Unsolicited Report Interval is the time between repetitions of a host’s initial report of
membership in a group. The allowed range is 0 to 31744 seconds; the default unsolicited report interval is 1 second.
• Buttons:
Apply: Click to apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
• Upper right icon (Refresh, |<<, >>): Click the Refresh icon to Refresh the displayed table starting from the “VLAN” input fields.
Or click “|<<” to update the table starting from the first entry in the VLAN table, i.e. the entry with the lowest VLAN ID.
Otherwise, click “>> “ to update the table, starting with the entry after the last entry currently displayed.
5.5.3 Port Group Filtering
The section describes how to set the IGMP Port Group Filtering. With the IGMP filtering feature, an user can exert this type of
control. In some network Application environments, such as metropolitan or multiple-dwelling unit (MDU) installations, a user
might want to control the multicast groups to which a user on a switch port can belong. This allows the user to control the
distribution of multicast services, such as IP/TV, based on some type of subscription or service plan.
With this feature, you can filter multicast joins on a per-port basis by configuring IP multicast profiles and associating them with
individual switch ports. An IGMP profile can contain one or more multicast groups and specifies whether access to the group is
permitted or denied. If an IGMP profile denying access to a multicast group is applied to a switch port, the IGMP join report
requesting the stream of IP multicast traffic is dropped, and the port is not allowed to receive IP multicast traffic from that group.
If the filtering action permits access to the multicast group, the IGMP report from the port is forwarded for normal processing.
IGMP filtering controls only IGMP membership join reports and has no relationship to the function that directs the forwarding of
IP multicast traffic.
Web Interface
To configure the IGMP Snooping Port Group Configuration in the web interface:
1. Click Configuration, IGMP Snooping, Port Group Filtering.
2. Click Add new Filtering Group.
Page 82
724-746-5500 | blackbox.com
Page 83
Chapter 5: Configuration
3. Scroll the Port to enable the Port Group Filtering. Specify the Filtering Groups in the blank field.
4. Click Apply to save the setting.
5. To cancel the setting, click the Reset button. The switch will revert to previously saved values.
Figure 5-28. The IGMP Snooping Port Group Filtering Configuration screen.
Parameter description:
• Delete: Check to delete the entry. It will be deleted during the next save.
• Port: Enable the IGMP Snooping Port Group Filtering function.
• Filtering Groups: The IP Multicast Group that will be filtered.
• Adding New Filtering Group: Click “Adding New Filtering Group” to add a new entry to the Group Filtering table. Specify the
Port, and Filtering Group of the new entry. Click “Apply.”
• Buttons:
Apply: Click to apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
5.5.4 Status
After you complete the IGMP Snooping configuration, the switch can display the IGMP Snooping Status. This section explains
how.
Web Interface
To display the IGMP Snooping status in the web interface:
1. Click Configuration, IGMP Snooping, Status.
2. To auto-refresh the information, select “Auto-refresh.”
3. Click “ Refresh“ to refresh the IGMP Snooping Status.
4. Click “ Clear“ to clear the IGMP Snooping Status.
724-746-5500 | blackbox.com
Page 83
Page 84
Chapter 5: Configuration
Figure 5-29. The IGMP Snooping Status.
Parameter description:
• VLAN ID: The VLAN ID of the entry.
• Querier Version: Working Querier Version currently.
• Host Version: Working Host Version currently.
• Querier Status: Shows the Querier status is "ACTIVE" or "IDLE".
• Queries Transmitted: The number of Transmitted Queries.
• Queries Received: The number of Received Queries.
• V1 Reports Received: The number of Received V1 Reports.
• V2 Reports Received: The number of Received V2 Reports.
• V3 Reports Received: The number of Received V3 Reports.
• V2 Leaves Received: The number of Received V2 Leaves.
• Auto-refresh: Select auto-refresh icon and the device will refresh the log automatically.
• Upper right icon (Refresh, clear): Select one of these options to refresh the Status or clear it manually.
5.5.5 Group Information
After you set the IGMP Snooping function, the switch can display the IGMP Snooping Group Information. Entries in the IGMP
Group Table are shown on this page. The IGMP Group Table is sorted first by VLAN ID, and then by group. The will use the last
entry of the currently displayed table as a basis for the next lookup. When the end is reached the text “No more entries” is shown
in the displayed table. Use the button to start over.
Page 84
724-746-5500 | blackbox.com
Page 85
Web Interface
To display the IGMP Snooping Group Information in the web interface:
1. Click Configuration, IGMP Snooping, Group Information.
2. To auto-refresh the information, select “Auto-refresh.”
3. Click “Refresh” to refresh an entry of the IGMP Snooping Groups Information.
4. Click “<< or >> “ to move to the previous or next entry.
Figure 5-30. The IGMP Snooping Groups Information.
Chapter 5: Configuration
Parameter description:
Navigating the IGMP Group Table
The “Start from VLAN,” and “group” input fields allow the user to select the starting point in the IGMP Group Table. It will use
the last entry of the currently displayed table as a basis for the next lookup. When the end is reached ,the text “No more entries”
is shown in the displayed table.
IGMP Group Table Columns
• VLAN ID: VLAN ID of the group.
• Groups: Group address of the group displayed.
• Port Members: Ports under this group.
• Auto-refresh: Select the auto-refresh icon to refresh the log automatically.
• Upper right icons (Refresh, <<, >> ): Click on the Refresh icon to refresh the IGMP Group Status manually, click on the other
icons for next/up page or entry..
5.5.6 IPv4 SSM information
Source Specific Multicast (SSM) is a datagram delivery model that best supports one-to-many applications, also known as
broadcast applications. SSM is a core network technology of IP multicast targeted for audio and video broadcast application
environments.
For the SSM delivery mode, an IP multicast receiver host must use IGMP Version 3 (IGMPv3) to subscribe to channel (S, G). By
subscribing to this channel, the receiver host is indicating that it wants to receive IP multicast traffic sent by source host S to group
G. The network will deliver IP multicast packets from source host S to group G to all hosts in the network that have subscribed to
the channel (S, G).
SSM does not require group address allocation within the network, only within each source host. Different applications running
on the same source host must use different SSM groups. Different applications running on different source hosts can arbitrarily
reuse SSM group addresses without causing any excess traffic on the network.
Addresses in the range 232.0.0.0/8 (232.0.0.0 to 232.255.255.255) are reserved for SSM by IANA. In the switch, you can also
configure SSM for arbitrary IP multicast addresses.
724-746-5500 | blackbox.com
Page 85
Page 86
Chapter 5: Configuration
Web Interface
To display the IGMPv3 IPv4 SSM Information in the web interface:
2. To auto-refresh the information, select “Auto-refresh.”
3. Click “Refresh” to refresh the IGMPv3 IPv4 SSM Information.
4. Click << or >> to move to previous or next entry.
Figure 5-31. The IGMPv3 IPv4 SSM Information.
Parameter description:
Navigating the IGMP SFM Information Table
Each page shows up to 99 entries from the IGMP SFM Information table (the default is 20) selected through the “entries per
page” input field. When first visited, the web page will show the first 20 entries from the beginning of the IGMP SFM Information
Tab le.
The “Start from VLAN” and “group’ input fields allow the user to select the starting point in the IGMP SFM Information Table.
Clicking the “Refresh” button will update the displayed table starting from that or the closest next IGMP SFM Information Table
match. In addition, the two input fields will—when you click the “Refresh” button—assume the value of the first displayed entry,
allowing for continuous refresh with the same start address.
The >> will use the last entry of the currently displayed table as a basis for the next lookup. When the end is reached, the text
“No more entries” is shown in the displayed table. Use the |<< button to start over.
IGMP SFM Information Table Columns
• VLAN ID: VLAN ID of the group.
• Group: Group address of the group displayed.
• Port: Switch port number.
• Mode: Indicates the filtering mode maintained per VLAN ID, port number, Group Address basis. It can be either Include or
Exclude.
• Source Address: IP Address of the source. Currently, the system limits the total number of IP source addresses for filtering to
128.
• Type: Indicates the Type. It can be either Allow or Deny.
• Auto-refresh: Click on the auto-refresh icon to refresh the log automatically.
• Upper right icon (Refresh, <<, >> ). Click on these icons to refresh the IGMP Group Status manually, or to go to the next/up
page or entry..
Page 86
724-746-5500 | blackbox.com
Page 87
Chapter 5: Configuration
5.6 MLD Snooping
Curiously enough, a network node that acts as a source of IPv6 multicast traffic is only an indirect participant in MLD snooping—
it just provides multicast traffic, and MLD doesn’t interact with it.
NOTE: In a desktop conferencing application, a network node may act as both a source and an MLD host, but MLD interacts
with that node only in its role as an MLD host.
A source node creates multicast traffic by sending packets to a multicast address. In IPv6, addresses with the first eight bits set
(that is, “FF” as the first two characters of the address) are multicast addresses, and any node that listens to such an address will
receive the traffic sent to that address. Application software running on the source and destination systems cooperates to
determine what multicast address to use.
NOTE: This is a function of the application software, not of MLD.
When MLD snooping is enabled on a VLAN, the switch acts to minimize unnecessary multicast traffic. If the switch receives
multicast traffic destined for a given multicast address, it forwards that traffic only to ports on the VLAN that have MLD hosts for
that address. It drops that traffic for ports on the VLAN that have no MLD hosts.
5.6.1 Basic Configuration
The section will explain how to configure the MLD Snooping basic configuration and the parameters.
Web Interface
To configure the MLD Snooping Configuration in the web interface:
NOTE: Disabling unregistered IPMCv6 traffic flooding may lead to Neighbor Discovery failure.
Page 88
724-746-5500 | blackbox.com
Page 89
Chapter 5: Configuration
• MLD SSM Range: SSM (Source-Specific Multicast) Range allows the SSM-aware hosts and routers run the SSM service model for
the groups in the address (Using IPv6 Address) range.
• Proxy Enabled: Enable MLD Proxy. This feature can be used to avoid forwarding unnecessary join and leave messages to the
router side.
• Router Port: Specify which ports act as router ports. A router port is a port on the Ethernet switch that leads towards the Layer
3 multicast device or MLD querier.
If an aggregation member port is selected as a router port, the whole aggregation will act as a router port.
• Fast Leave: Enables the fast leave on the port.
• Throttling: Limits the number of multicast groups to which a switch port can belong.
• Buttons:
Apply: Click to Apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
5.6.2 VLAN Configuration
When MLD snooping is enabled on a VLAN, the switch acts to minimize unnecessary multicast traffic. If the switch receives
multicast traffic destined for a given multicast address, it forwards that traffic only to ports on the VLAN that have MLD hosts for
that address. It drops traffic for ports on the VLAN that have no MLD hosts.
The switch will use the last entry of the currently displayed entry as a basis for the next lookup. When the end is reached the text
“No more entries” is shown in the displayed table. Use the button to start over.
Web Interface
To configure the MLD Snooping VLAN Configuration in the web interface:
3. Click “Refresh” to refresh a entry of the MLD Snooping VLAN Configuration Information.
4. Click “<< or >> “ to move to the previous or next entry.
Figure 5-34. The MLD Snooping VLAN Configuration.
Parameter description:
• VLAN ID: The VLAN ID of the entry.
• Snooping Enabled: Enable the per-VLAN MLD Snooping. Up to 32 VLANs can be selected.
• MLD Querier: A router sends MLD Query messages onto a particular link. This Router is called the Querier.. Enable the MLD
Querier in the VLAN.
724-746-5500 | blackbox.com
Page 89
Page 90
Chapter 5: Configuration
• Compatibility: Compatibility is maintained by hosts and routers taking appropriate actions depending on the versions of MLD
operating on hosts and routers within a network. The allowed selection is MLD-Auto, Forced MLDv1, Forced MLDv2; the default
compatibility value is MLDAuto.
• Rv: Robustness Variable. The Robustness Variable allows tuning for the expected packet loss on a network. The allowed range is
1 to 255; the default robustness variable value is 2.
• QI: Query Interval. The Query Interval is the interval between General Queries sent by the Querier. The allowed range is 1 to
31744 seconds; the default query interval is 125 seconds.
• QRI: Query Response Interval. The Maximum Response Delay used to calculate the Maximum Response Code inserted into the
periodic General Queries. The allowed range is 0 to 31744 in tenths of seconds; the default query response interval is 100 in
tenths of seconds (10 seconds).
• LLQI (LMQI for IGMP): Last Listener Query Interval. The Last Listener Query Interval is the Maximum Response Delay used to
calculate the Maximum Response Code inserted into Multicast Address Specific Queries sent in response to Version 1 Multicast
Listener Done messages. It is also the Maximum Response Delay used to calculate the Maximum Response Code inserted into
Multicast Address and Source Specific Query messages. The allowed range is 0 to 31744 in tenths of seconds; the default last
listener query interval is 10 in tenths of seconds (1 second).
• URI: Unsolicited Report Interval. The Unsolicited Report Interval is the time between repetitions of a node’s initial report of
interest in a multicast address. The allowed range is 0 to 31744 seconds: the default unsolicited report interval is 1 second.
• Upper right icon (Refresh, <<, >> ): Click on these icons to refresh the IGMP Group Status manually or to go to the next/up
page or entry..
• Buttons:
Apply: Click to apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
5.6.3 Port Group Filtering
The section explains how to set the Port Group Filtering in the MLD Snooping function. You can add a new filtering group and
safety policy on the user interface (UI).
Web Interface
To configure the MLD Snooping Port Group Configuration in the web interface:
1. Click Configuration, MLD Snooping, Port Group Filtering Configuration.
2. Click the Add new Filtering Group.
3. Specify the Filtering Groups with entries per page.
4. Click apply to save the setting.
5. To cancel the setting, click the Reset button. The switch will revert to previously saved values.
Page 90
724-746-5500 | blackbox.com
Page 91
Figure 5-35. The MLD Snooping Port Group Filtering Configuration screen.
Parameter description:
• Delete: Check to delete the entry. It will be deleted during the next save.
Chapter 5: Configuration
• Port: The logical port for the settings. You can evoke to enable the port to join a filtering Group.
• Filtering Groups: The IP Multicast Group that will be filtered.
• Buttons:
Apply: Click to apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
Publication date: July., 2013
5.6.4 Status
The section describes how to display the MLD Snooping Status and detailed information.
MLD Snooping status.
Web Interface
To display the MLD Snooping Status in the web interface:
1. Click Configuration, MLD Snooping, Status.
2. To auto-refresh the information, select “Auto-refresh.”
3. Click “Refresh” to refresh an entry of the MLD Snooping Status Information.
4. Click “Clear” to clear the MLD Snooping Status..
724-746-5500 | blackbox.com
Page 91
Page 92
Chapter 5: Configuration
Figure 5-36. The MLD Snooping Status.
Parameter description:
• VLAN ID: The VLAN ID of the entry.
• Querier Version: Currently working Querier Version.
• Host Version: Currently working Host Version.
• Querier Status: Show the Querier status is “ACTIVE” or “IDLE.”
• Queries Transmitted: The number of Transmitted Queries.
• Queries Received: The number of Received Queries.
• V1 Reports Received: The number of Received V1 Reports.
• V2 Reports Received: The number of Received V2 Reports.
• V1 Leaves Received: The number of Received V1 Leaves.
• Auto-refresh: Select the auto-refresh icon and the device will refresh the log automatically.
• Upper right icon (Refresh, <<, >> ): Click to refresh the IGMP Group Status manually or to go to the next/up page or entry..
Page 92
724-746-5500 | blackbox.com
Page 93
Chapter 5: Configuration
5.6.5 Group Information
The section describes how to set the MLD Snooping Groups Information. The “Start from VLAN” and “group” input fields allow
the user to select the starting point in the MLD Group Table.
Each page shows up to 99 entries from the MLD Group table (the default is 20) selected through the “entries per page” input
field. When first visited, the web page will show the first 20 entries from the beginning of the MLD Group Table.
Web Interface
To display the MLD Snooping Group information in the web interface:
1. Click Configuration, MLD Snooping, Group Information
2. To auto-refresh the information, click on “Auto-refresh.”
3. Click “Refresh” to refresh an entry of the MLD Snooping Group Information.
4. Click “Clear” to clear the MLD Snooping Groups information.
Figure 5-37. The MLD Snooping Groups Information screen.
Parameter description:
Navigating the MLD Group Table
Each page shows up to 99 entries from the MLD Group table (the default is 20) selected through the “entries per page” input
field. When first visited, the web page will show the first 20 entries from the beginning of the MLD Group Table. The “Start from
VLAN” and “group” input fields allow the user to select the starting point in the MLD Group Table. Clicking the button will
update the displayed table starting from that or the next closest.
MLD Group Table match. In addition, the two input fields will—upon a button click— assume the value of the first displayed
entry, allowing for continuous refresh with the same start address. It will use the last entry of the currently displayed table as a
basis for the nextlookup. When the end is reached the text, “No more entries” is shown in the displayed table. Use the button to
star t over.
MLD Snooping Information Table Columns
• VLAN ID: VLAN ID of the group.
• Groups: Group address of the group displayed.
• Port Members: Ports under this group.
• Auto-refresh: Select the auto-refresh icon to refresh the log automatically.
• Upper right icon (Refresh, <<, >> ): Click on these icons to refresh the IGMP Group Status manually or to go to the next/up
page or entry.
5.6.6 IPv6 SSM Information
The section describes the user to configure the Entries in the MLDv2 Information Table are shown on this page. The MLDv2
Information Table is sorted first by VLAN ID, then by group, and then by Port No. Diffrent source addresses belong to the same
group are treated as single entry.
724-746-5500 | blackbox.com
Page 93
Page 94
Chapter 5: Configuration
Each page shows up to 64 entries from the MLDv2 SSM (Source Specific Multicast) Information table (the default is 20) selected
through the “entries per page” input field. When first visited, the web page will show the first 20 entries from the beginning of
the MLDv2 Information Table. The “Start from VLAN” and “group” input fields allow the user to select the starting point in the
MLDv2 Information Table.
Web Interface
To display the MLDv2 IPv6 SSM Information in the web interface:
2. To auto-refresh the information, select “Auto-refresh.”
3. Click “ Refresh“ to refresh an entry of the MLDv2 IPv6 SSM Information.
4. Click “<< or >> “ to move to previous or next entry.
Figure 5-38. The IPv6 SSM Information.
Parameter description:
MLDv2 Information Table Columns
• VLAN ID: VLAN ID of the group.
• Group: Group address of the group displayed.
• Port: Switch port number.
• Mode: Indicates the filtering mode maintained per VLAN ID, port number, Group Address basis. It can be either Include or
Exclude.
• Source Address: IP Address of the source. Currently, system limits the total number of IP source addresses for filtering to be 128.
• Type: Indicates the Type. It can be either Allow or Deny.
5.7 MVR
The MVR feature enables multicast traffic forwarding on the Multicast VLAN. In a multicast television application, a PC or a
television with a set-top box can receive the multicast stream. Multiple set-top boxes or PCs can be connected to one subscriber
port, which is a switch port configured as an MVR receiver port. When a subscriber selects a channel, the set-top box or PC sends
an IGMP join message to Switch A to join the appropriate multicast. Uplink ports that send and receive multicast data to and
from the multicast VLAN are called MVR source ports.
5.7.1 Configuration
The section describes how to set the MVR basic Configuration and some parameters in the switch.
Web Interface
To configure the MVR Configuration in the web interface:
1. Click Configuration, MVR, Configuration.
2. Scroll the MVR mode to enable or disable and Scroll to set all parameters.
Page 94
724-746-5500 | blackbox.com
Page 95
3. Click Apply to save the setting.
4. To cancel the setting, click the Reset button. It will revert to previously saved values.
Chapter 5: Configuration
Parameter description:
• MVR Mode: Enable/Disable the Global MVR.
• VLAN ID: Specify the Multicast VLAN ID.
• Mode: Enable MVR on the port.
• Type: Specify the MVR port type on the port.
• Immediate Leave: Enable the fast leave on the port.
• Buttons:
Apply: Click to save changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
Figure 5-39. The MVR Configuration.
724-746-5500 | blackbox.com
Page 95
Page 96
Chapter 5: Configuration
5.7.2 MVR Port Group Allow Configuration
The section describes how to add the IP Multicast Group to receive the multicast stream. Entries in the MVR port group allow
table are shown on this page. The MVR Port Group Table is sorted first by port, and then by IP address.
Web Interface
To display the MVR Groups Information in the web interface:
1. Click Configuration, MVR, Port Groups Allow.
2. To add the new allowed group, click the “Add new Allow Group” button.
3. Select the “Port No.,” “Start Address,” and “End Address.”
3. Click “Apply” to apply the configuration of MVR Port Group Allow Table.
Parameter description:
• Delete: Check to delete the entry. It will be deleted during the next apply.
• Port: The logical port for the settings.
• Allow Groups: The IP Multicast Group that will be allowed.
• Adding New Allow Group: Click “Add New Allow Group” to add a new entry to the Group Allow table. Specify the Port, and
Allow Group of the new entry. Click “Apply.”
• Buttons:
Apply: Click to save changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
5.7.3 Groups Information
The section describes how to display the MVR Groups detail information on the switch. Entries in the MVR Group Table are
shown on this page. The MVR Group Table is sorted first by VLAN ID, and then by group.
Page 96
Figure 5-40. MVR Groups Information screen.
724-746-5500 | blackbox.com
Page 97
Web Interface
To display the MVR Groups Information in the web interface:
1. Click Configuration, MVR, Groups Information.
2. To auto-refresh the information, click “Auto-refresh.”
3. Click the “Refresh” button to refresh a entry of the MVR Groups Information.
4. Click “<< or >> “ to move to the previous or next entry.
Figure 5-41. The MVR Groups Information.
Chapter 5: Configuration
Parameter description:
MVR Group Table Columns
• VLAN ID: VLAN ID of the group.
• Groups: Group ID of the group displayed.
• Port Members: Ports under this group.
• Auto-refresh: Select the auto-refresh icon and the device will refresh the information automatically.
• Upper right icon (Refresh, <<, >> ): Click on these icons to manually refresh the MVR Group information or go to the next/up
page or entry.
5.7.4 Statistics
The section describes detailed MVR Statistics Information that will display after you configure MVR on the switch.
Web Interface
To display the MVR Statistics Information in the web interface:
1. Click Configuration, MVR, Statistics.
2. To auto-refresh the information, select “Auto-refresh.”
3 .Click “Refresh” to manually refresh an entry of the MVR Statistics Information.
4. Click “<< or >> “ to move to the previous or next entry.
Figure 5-42. The MVR Statistics Information.
724-746-5500 | blackbox.com
Page 97
Page 98
Chapter 5: Configuration
Parameter description:
• VLAN ID: The Multicast VLAN ID.
• V1 Reports Received: The number of Received V1 Reports.
• V2 Reports Received: The number of Received V2 Reports.
• V3 Reports Received: The number of Received V3 Reports.
• V2 Leaves Received: The number of Received V2 Leaves.
• Auto-refresh: Click on the auto-refresh icon to refresh the information automatically.
• Upper right icon (Refresh, <<, >> ): Clickto refresh the MVR Group information manually or to go to the next/up page or entry.
5.8 LLDP
The switch supports the LLDP. For current information on your switch model, The Link Layer Discovery Protocol (LLDP) provides a
standards-based method for enabling switches to advertise themselves to adjacent devices and to learn about adjacent LLDP
devices. The Link Layer Discovery Protocol (LLDP) is a vendor-neutral Link Layer protocol in the Internet Protocol Suite used by
network devices for advertising their identity, capabilities, and neighbors on a IEEE 802 local area network, principally wired
Ethernet. The protocol is formally referred to by the IEEE as Station and Media Access Control Connectivity Discovery specified in
standards document IEEE 802.1AB.
5.8.1 LLDP Configuration
You can configure the LLDP and the detail parameters per port and the settings will take effect immediately. This page allows the
user to inspect and configure the current LLDP port settings.
Web Interface
To configure LLDP:
1. Click LLDP configuration.
2. Modify LLDP timing parameters.
3. Set the required mode for transmitting or receiving LLDP messages.
4. Specify the information to include in the TLV field of advertised messages.
5. Click Apply.
Page 98
724-746-5500 | blackbox.com
Page 99
Chapter 5: Configuration
Parameter description:
LLDP Parameters
• Tx Interval: The switch periodically transmits LLDP frames to its neighbors to ensure that the network discovery information is
up-to-date. The interval between each LLDP frame is determined by the Tx Interval value. Valid values are restricted to 5–32768
seconds.
• Tx Hold: Each LLDP frame contains information about how long the information in the LLDP frame will be considered valid. The
LLDP information valid period is set to Tx Hold multiplied by Tx Interval seconds. Valid values are restricted to 2–10 times.
• Tx Delay: If some configuration is changed (e.g. the IP address) a new LLDP frame is transmitted, but the time between the LLDP
frames will always be at least the value of Tx Delay seconds. Tx Delay cannot be larger than 1/4 of the Tx Interval value. Valid
values are restricted to 1–8192 seconds.
• Tx Reinit: When a port is disabled, LLDP is disabled or the switch is rebooted, an LLDP shutdown frame is transmitted to the
neighboring units, signaling that the LLDP information isn't valid anymore. Tx Reinit controls the amount of seconds between the
shutdown frame and a new LLDP initialization. Valid values are restricted to 1–10 seconds.
Figure 5-43. LLDP Configuration screen.
724-746-5500 | blackbox.com
Page 99
Page 100
Chapter 5: Configuration
LLDP Port Configuration
The LLDP port settings relate to the currently selected, as reflected by the page header.
• Port: The switch port number of the logical LLDP port.
• Mode: Select LLDP mode.
Rx only: The switch will not send out LLDP information, but LLDP information from neighbor units is analyzed.
Tx only: The switch will drop LLDP information received from neighbors, but will send out LLDP information.
Disabled :The switch will not send out LLDP information, and will drop LLDP information received from neighbors.
Enabled The switch will send out LLDP information, and will analyze LLDP information received from neighbors.
• CDP Aware: Select CDP awareness.
The CDP operation is restricted to decoding incoming CDP frames (The switch doesn't transmit CDP frames). CDP frames are
only decoded if LLDP on the port is enabled.
Only CDP TLVs that can be mapped to a corresponding field in the LLDP neighbors table are decoded. All other TLVs are
discarded (Unrecognized CDP TLVs and discarded CDP frames are not shown in the LLDP statistics.). CDP TLVs are mapped onto
the LLDP neighbors table as shown below.
CDP TLV "Device ID" is mapped to the LLDP "Chassis ID" field.
CDP TLV "Address" is mapped to the LLDP "Management Address" field. The CDP address TLV can contain multiple addresses,
but only the first address is shown in the LLDP neighbors table.
CDP TLV "Port ID" is mapped to the LLDP "Port ID" field.
CDP TLV "Version and Platform" is mapped to the LLDP "System Description" field.
Both the CDP and LLDP support "system capabilities," but the CDP capabilities cover capabilities that are not part of the LLDP.
These capabilities are shown as "others" in the LLDP neighbors table.
If all ports have CDP awareness disabled the switch forwards CDP frames received from neighbor devices. If at least one port
has CDP awareness enabled all CDP frames are terminated by the switch.
NOTE: When CDP awareness on a port is disabled the CDP information isn't removed immediately, but is removed when the
hold time is exceeded.
• Port Descr: Optional TLV: When checked the “port description” is included in LLDP information transmitted.
• Sys Name: Optional TLV: When checked the "system name" is included in LLDP information transmitted.
• Sys Descr: Optional TLV: When checked the "system description" is included in LLDP information transmitted.
• Sys Capa: Optional TLV: When checked the "system capability" is included in LLDP information transmitted.
• Mgmt Addr: Optional TLV: When checked the "management address" is included in LLDP information transmitted.
• Buttons:
Apply: Click to Apply changes.
Reset: Click to undo any changes made locally and revert to previously saved values.
5.8.2 LLDP Neighbors
This page provides a status overview for all LLDP neighbors. The displayed table contains a row for each port on which an LLDP
neighbor is detected. The columns hold the following information:
Page 100
724-746-5500 | blackbox.com
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.